Web Spoofing 1 Outline Motivation Web spoofing problem Web spoofing attacks – works done Web spoofing Countermeasures – works done New Idea.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Tutorial 8: Developing an Excel Application
Learn to protect yourself... a 21 st Century Scam.. Phishing.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Internet Phishing Not the kind of Fishing you are used to.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Context-Aware Phishing Attacks and Client-Side Defenses Collin Jackson Stanford University.
CM143 - Web Week 2 Basic HTML. Links and Image Tags.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Spoofing Rafael Sabino 10/28/2004. Introduction What is spoofing? Context and Security relevant decisions Phishing Web spoofing Remedies.
How the World Wide Web Works
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
2. Introduction to the Visual Studio.NET IDE 2. Introduction to the Visual Studio.NET IDE Ch2 – Deitel’s Book.
Chapter 11 Adding Media and Interactivity. Flash is a software program that allows you to create low-bandwidth, high-quality animations and interactive.
Presented By Jay Dani.  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine,
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Classroom User Training June 29, 2005 Presented by:
Prevent Cross-Site Scripting (XSS) attack
CSCI 6962: Server-side Design and Programming Introduction to AJAX.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Tutorial 10 Adding Spry Elements and Database Functionality Dreamweaver CS3 Tutorial 101.
Introducing Dreamweaver MX 2004
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
Reliability & Desirability of Data
IT security By Tilly Gerlack.
10 Adding Interactivity to a Web Site Section 10.1 Define scripting Summarize interactivity design guidelines Identify scripting languages Compare common.
University of Sunderland CDM105 Session 5 Web Authoring Tools The past and present A history of web authoring tools and an overview of Macromedia Dreamweaver.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Internet Browsing the world. Browse Internet Course contents Overview: Browsing the world Lesson 1: Internet Explorer Lesson 2: Save a link for future.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
CPSC 203 Introduction to Computers Lab 23 By Jie Gao.
Lecture # 6 Forms, Widgets and Event Handling. Today Questions: From notes/reading/life? Share Personal Web Page (if not too personal) 1.Introduce: How.
15.1 Fundamentals of HTML.
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Drive-by pharming is an interesting type of networking attack that combines multiple networking vulnerabilities and average user laziness to create an.
For the World Wide Web Designing with Frames.  One of the most popular climbing schools in Colorado is Cliff Hangers. Located in Bolder, Cliff Hangers.
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
How Phishing Works Prof. Vipul Chudasama.
15.1 Fundamentals of HTML DeKalb County School System.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
15.1 Fundamentals of HTML 2 assignments: 1st—complete the worksheet. 2nd—create your first HTML web page following the directions in this PowerPoint where.
The Internet and World Wide Web Sullivan University Library.
2004/051 >> Supply Chain Solutions That Deliver Users.
Chapter 11 Adding Media and Interactivity. Chapter 11 Lessons Introduction 1.Add and modify Flash objects 2.Add rollover images 3.Add behaviors 4.Add.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Microsoft Windows 7 - Illustrated Unit G: Exploring the Internet with Microsoft Internet Explorer.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Objective % Select and utilize tools to design and develop websites.
Phishing is a form of social engineering that attempts to steal sensitive information.
Objective % Select and utilize tools to design and develop websites.
Welcome and thank you for choosing SharkGate
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Week 7 - Wednesday CS363.
Presentation transcript:

Web Spoofing 1 Outline Motivation Web spoofing problem Web spoofing attacks – works done Web spoofing Countermeasures – works done New Idea

Web Spoofing 2 Citibank scam account holder citibank Not the real bank Tricked to the wrong site Your account was blocked, you have to fill a form in the following link

Web Spoofing 3 PayPal Targeted by Scam Artists account holder Not the real bank Tricked to the wrong site We are replacing the current system with a new one. click here to fill your details.

Web Spoofing 4 Bank Leumi – potential scam Consistency LackComplex Url Structure

Web Spoofing 5 Our Players server authentication is possible. user server performs sensitive tasks. Is the browser-user communication model secure enough to warrant this assumption.

Web Spoofing 6 He Wants to check his bank account Great. I get it. Intended site Faked site Other sites Faked Site ! Faked Site ! Internet Spoofing is pretending to be someone else. Web Spoofing The user surf a “faked site” as it was the real one he intended to.

Web Spoofing 7 Faked Site Site that imitate another one in its appearance and action for malicious purposes. To succeed, the imitation process must take into account the level of awareness of the potential victim. Content imitationContent & Status imitation Imitate the page content Created by copying HTML files. “fine” for users who judge sites according to their Visual Context. page content as sent by the server Status information produced by the browser Actions must be imitated Requires some programming efforts. “fine” for sophisticated users.

Web Spoofing 8 How the Users Get “Phished” Normal surfing Link in popular web page Search engine Web-enabled Sent by the attacker Man in the middle attack The attacker sit between the user and the real site

Web Spoofing 9 Web spoofing: An Internet Con Game Edward W.Felten and others. spoofing entire WWW attacks remedy Works Done Web Spoofing Revisited: SSL and Beyond – 2002 Zishuang, Yuan and Smith. Can users believe what their browsers tell them? Trust on Web Browser: Attack vs. Defence No author given Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing – 2002 Zishuang, Yuan and Smith. Demonstrate Open source solution

Web Spoofing 10 request url real page content change page 5 spoofed page content Request real url Victim somehow lured into the attacker Web. Victim remains trapped in the attacker’s web due to url rewriting. rewritten 4

Web Spoofing 11 Complete the Illusion Still there some evidence that may disclose the attack. Status Line Mouse click/move events written in javascript Location Line Replace the original with fake one. Viewing Document Source Hide the menu bar and provide another SSL evidence do not help The secure connection made against the attacker’s site.The secure connection made against the attacker’s site.

Web Spoofing 12 The target was WebBlitz, a web-based system.The target was WebBlitz, a web-based system. The language used was Javascript. They take into account the browser type.(Netscape, IE). Create new window with all bars turned off. They provide a interactive fake bars instead. The location bar get input from keyboard A fake statusbar with lock icon to indicate SSL session. The fake statusbar updated as needed SSL warning windows spoofed also. They spoof the server certificate that emerged when lock icon double clickedThey spoof the server certificate that emerged when lock icon double clicked Images were cached to improve load time

Web Spoofing 13 Countermeasures Browser Configuration & recommendations Configuring browser settings: disable javascript Short term Maybe selective Make sure the location bar always visible Make sure the url points to the server you intended to Browser Extension Extending functionality so the user interface is safe Long term Good solution must prevent web spoofing and keep the browser in full functionality.

Web Spoofing 14 Abstract suggest a solution that defend against web spoofing. create a trusted path from the browser to the user. implemented in Mozilla: open source browser. Design Criteria Effectiveness User can correctly recognize large amount of status info Work Cannot expect users to do a lot of work Intrusiveness Minimize intrusion on content

Web Spoofing 15 Rejected Approaches Preventing the open of windows with status elements turned off. What about pop-up warning window What about certificate information pages Constrict the display of server pages User enter a “MAC phrase” at startup and browser insert it in each status element. Adding some phrase to the title of windows.

Web Spoofing 16 Solution marking scheme that servers could not predict. This scheme marks the trusted status content. Synchronized random dynamic boundaries SRD Window Types untrusted trusted Server materialBrowser material Style of boundary changes in random.

Web Spoofing 17 Animation of the Solution

Web Spoofing 18 New Idea Creating a safe region in the top of each browser window. It is out of loaded sites control. Enable personal skinning. SSL secured sites identified by a logo in this region. Credential logos will appear in this region Implemented in Mozilla browser.

Web Spoofing 19 לוגו לזיהוי המלצה אזור בטוח

Web Spoofing 20 דפדפןאתר הקמת ערוץ בטוח / אמות תעודת שרת TBSR רשימת המלצות ולוגויים ע"פ בקשה המלצות נוספות מהאנטרנט דפדפן משופר Ineraction between TBRS and other entities

Web Spoofing 21 CAMM SRCM CTM CCM דפדפן אתר נצפה מקורות נוספים תעודת שרת ראשונית ה מ ל צ ו ת המלצות שנאספו המלצות במבנה אחיד מאפיינים ממופים ללוגיים הצגת לוגויים באזור הבטוח TBRS Components