Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
WEB BROWSER SECURITY By Robert Sellers Brian Bauer.
Workshop 6: SSL/TLS The HTTPS stripping attacks Zhou Peng and Daoyuan Wu 25 April 2014.
Cross Site Scripting a.k.a. XSS Szymon Siewior. Disclaimer Everything that will be shown, was created for strictly educational purposes. You may reuse.
COMP 321 Week 12. Overview Web Application Security  Authentication  Authorization  Confidentiality Cross-Site Scripting Lab 12-1 Introduction.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
IDAsec copyright - all rights reserved1 Web Vulnerabilities in the real world.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
Cross-Site Scripting Vulnerabilities Adam Doupé 11/24/2014.
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CSE 154 LECTURE 12: COOKIES. Including files: include include("filename"); PHP include("header.html"); include("shared-code.php"); PHP inserts the entire.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
The attacks ● XSS – type 1: non-persistent – type 2: persistent – Advanced: other keywords (, prompt()) or other technologies such as Flash.
Web Applications Testing By Jamie Rougvie Supported by.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
What Is XSS ? ! Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
INFO 344 Web Tools And Development CK Wang University of Washington Spring 2014.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Windows Administration How to protect your computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
CSCE 548 Student Presentation Ryan Labrador
Hotspot Shield Protect Your Online Identity
IT Security  .
Ways to protect yourself against hackers
Latest Updates on BlackHawk Mines Music : Privacy Policy
Auditing Etsy The Security of Etsy
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Wireless Spoofing Attacks on Mobile Devices
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson

Lab 3 Goals Learn what cookies are Learn about Cross-Site Scripting Attacks Learn what it means to steal cookie information Get hands on experience with a web browser vulnerability

What are cookies? Nope, not the kind you eat! ;) The Kind that track you like a creepy stalker! Cookies are data stored in a web browser There many different “types” of cookies: Session, Persistent/Tracking Persistent cookies are cookies that will outlast user sessions and are used for a variety of reasons Zombie Cookies that recreate themselves Cookies identify who you are to a website The website stores this information (like your username and password) to help provide you with the pages you view They can be used to keep track and keep records of users browsing histories and activity

…. Are they Good or Bad? Cookies can be tracked by third-parties and are used by advertising companies to track users across multiple sites and pages. For example, in 2002 the CIA was leaving persistent cookies on computers who were visiting their sites. In 2005, The NSA has also left persistent cookies from a software upgrade. RFC 2965 specifies that browsers should protect user privacy and not allow third-party cookies by DEFAULT. BUT most browsers ALLOW these third-party cookies by default. It is allowed because browsers and the third-party website has it stated in their Policies and agreements For instance, Do you think Facebook should have the right to track your Google searches? Or any online activity?

Cross-site Scripting Attacks/XSS These vulnerabilities would occur in the server- side code They are vulnerabilities in Web Applications XSS injects client-side script into web pages There are different kinds of XSS attacks, but Lab 3 deals with cookie stealing through XSS The injected code Steals a cookie that should be only exchanged between the server/client and is sent to another party

We will be using these Webhacking.zip Files malURL.htm Redirectpage.htm Setgetcookie.htm Stealcookie.php Log.txt

Lab 3 Process 1.User first opens setgetcookie.htm on vulnerable site 2.Sets cookie 3.Attacker sends malURL.htm to user with malicious URLs in it 4.Clicking on them redirects user to redirectpage.htm 5.redirectpage.htm has script embedded in a html tag 6.Script inputs the document’s cookie to stealcookie.php on attacker’s site 7.Stealcookie.php logs the cookie on attacker’s site

setgetcookie.htm

malURL.htm

Hovering over each link with your cursor shows two different destinations. One is more deceiving and more likely to be opened/clicked on

Second Link: redirectpage.htm redirects to stealcookie.php <?php $f = fopen("log.txt","a"); $cookie = "\n".$_GET['username']."\n"; fwrite($f, $cookie); fclose($f); ?>

Log.txt Stealcookie.php file stores the cookie into the log.txt file BAM!!! You’re HACKED!

Today: Changes and Threats Lab 3 is only an example of the general process of XSS cookie stealing and would not work in real world because of an increase in the web browsing security. Modern browsers are more sophisticated now and don’t relocate to new sites without permission and they filter out scripts from links But hackers come up new ways around these features EVERYDAY Which is why it is so important to update all of your software regularly. Examples of cookie stealing: Malicious links through instant messengers, s, spam, Facebook, disguised websites, disguised links Web browsing and clicking on malicious links Injected sophisticated scripting code to trick users

Real World Cookie Stealing Example Facebook cookie stealing Example: You can capture packets using a free network packet analyzer This is where you can Find a “cookie” over an internet connection You’ll need other applications as well like Firefox, greasemonkey, and cookieinjector script This example gives you access to their account but doesn’t give you their credentials Only works if Facebook connection is HTTP Prevented by using HTTPS which you can enable in your Browser under Account Settings>Security

Preventing cookie stealing Using HTTPS encrypts and protects Web Vulnerability Scanners Choosing to “Remember Me” uses Google uses similar cookies for its services Detecting suspicious activity on server side Requiring Re-authentication Cookies are browser specific Browser Fingerprint Change Browser Settings to tell websites not to track you

Any Questions?