COEN 252 Computer Forensics Phishing  Thomas Schwarz, S.J. 2006.

Slides:



Advertisements
Similar presentations
3.02H Publishing a Website 3.02 Develop webpages..
Advertisements

Enabling Secure Internet Access with ISA Server
How to protect yourself, your computer, and others on the internet
WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
JavaScript FaaDoOEngineers.com FaaDoOEngineers.com.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web server security Dr Jim Briggs WEBP security1.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
The Internet & The World Wide Web Notes
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Forensic and Investigative Accounting
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
Chapter 6: Forms JavaScript - Introductory. Previewing the Product Registration Form.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
Lesson 2 — The Internet and the World Wide Web
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
JavaScript, Fourth Edition
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Chapter 8 Cookies And Security JavaScript, Third Edition.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
1 Welcome to CSC 301 Web Programming Charles Frank.
ITCS373: Internet Technology Lecture 5: More HTML.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
How Phishing Works Prof. Vipul Chudasama.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Topic 5: Basic Security.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
3.02H Publishing a Website 3.02 Develop webpages..
IT Security  .
CISC103 Web Development Basics: Web site:
ISYM 540 Current Topics in Information System Management
Phishing is a form of social engineering that attempts to steal sensitive information.
CISC103 Web Development Basics: Web site:
Presentation transcript:

COEN 252 Computer Forensics Phishing  Thomas Schwarz, S.J. 2006

URL Obscuring Internet based criminal activity that subverts web technology: Phishing (fraud) Traffic redirection Hosting of illegal sites Child pornography

URL Obscuring Internet based fraud is gaining quickly in importance. Phishing: The practice of enticing victims with spoofed to visit a fraudulent webpage.

URL Obscuring Technical Subterfuge: Plants crimeware onto PCs. Example: Vulnerable web browser executes remote script at a criminal website. Just staying away from porn no longer protects you. Payload: Use Trojan keylogger spyware. Search for financial data and send it to an untraceable address

URL Obscuring Social Engineering: Target receives pretending to be from an institution inviting to go to the institutions website. Following the link leads to a spoofed website, which gathers data. It is possible to establish a web-presence without any links: Establish website with stolen / gift credit card. Use to send harvested information to an untraceable account, etc. Connect through public networks.

URL Obscuring Phishing Targets general population Thrives even with very low success rate Spear Phishing Targets individuals More sophisticated and more expensive Individual success has higher value

URL Obscuring: Phishing Example Visible Link: Actual Link: Actual website IP: Uses Java program to overwrite the visible address bar in the window:

URL Obscuring: Phishing Example

Phishing Tendencies Phishs currently are very unsophisticated Sophistication does not yield much better success rate

URL Obscuring Phishs need to hide web-servers URL Obscuring Javascript or other active web-technology overwrites URL field no longer possible in latest browsers Other techniques to hide web-server address Use hosts file Hiding illegal web-server at legal site Hijacking site to host pages.

URL Basics Phishs can use obscure features of URL. URL consists of three parts: Service Address of server Location of resource.

URL Basics Scheme, colon double forward slash. An optional user name and password. The internet domain name RCF1037 format IP address as a set of four decimal digits. Port number in decimal notation. (Optional) Path + communication data.

Obscuring URL Addresses Embed URL in other documents Use features in those documents to not show complete URL URL rules interpret this as a userid. Hide this portion of the URL.

Obscuring URL Addresses Use the password field. has IP address Some browsers accept the decimal value 129*256** *256**2 + 2* = for the IP address. Works as a link. Does not work directly in later versions of IE

Obscuring URL Addresses works. Hide the ASCI encoding Or just break up the name: Or use active page technologies (javascript, …) to create fake links.

Obscuring URL Addresses IDN – International Domain Names Non-english Unicode characters are encoded as basic ASCII strings: punycode punycode example b ű cher.ch encoded as xn- - bcher – kva.ch Homographs: Characters from different alphabets look the same Potential URL Obscuring Register paypal.com, where one ‘a’ comes from a different alphabet.

Obscuring URL Addresses Padding URLs.. means go up create directory …

Obscuring URL Addresses Redirection Direct target redirects to main site Chances of main site getting shut down is less Technologies Page-based redirection Add meta tag to head section Server-based redirection Apache: httpd.conf with a redirect statement Redirection via vulnerable websites 2006 eBay run a script that redirected based on query string to any site.

'Enroll your card with Verified By Visa program' 2004 Phish sends SPAM consisting of a single image:

'Enroll your card with Verified By Visa program' The whole text is a single image, linked to the correct citi URL. If the mouse hovers over the image, it displays the correct citi URL. But surrounded by an HTML box that leads to the phishing website.

'Enroll your card with Verified By Visa program' Target webpage has an address bar that is overwritten with a picture with a different URL. Go to

Phishing Phishers now use bogus https techniques. Exploiting browser flaws to display secure icon. Hacking legitimate sites or frames from these sites directly. Purchase and present certificates for sites that are named in resemblance of the target sites. The SSL lock icon is no longer a guarantee for a legitimate site.

Registrar Impersonation Phishing Attacks Phisher sets up a bogus registrar customer portal Phisher composes correspondence from registrar Phisher sends to the contact addresses for a domain name Victims visit bogus registrar customer portal and disclose login credentials Phisher collects account credentials for subsequent misuse

Registrar Impersonation Phishing Attacks Domain name registration information is open to the public E.g. whois for windows or linux/unix Adversary can use this information (plus web) in order to target potential victims For example, those whose registration is close to expiration The information is also used to enhance the credibility of the message

Use whois

Registrar Impersonation Phishing Attacks Once authentication information is obtained Modify DNS records to point to name servers under attacker’s control MX: Points to mail hosts under attacker’s control and use them to send spam, … The victim was trusted AAAA or A: To point to systems under attacker control To host phony content To provide false authentication portals

Registrar Impersonation Phishing Attacks Fast Flux attacks Fully qualified domain name has multiple (hundreds or even thousands) IP addresses assigned to it.

Registrar Impersonation Phishing Attacks Counter measures taken: Registrars limit open information severely Should not use to communicate with clients

Hiding Hosts Name Look-Up: OS checks HOST file first. Can use HOST file to block out certain sites adservers Affects a single machine. OSLocation Linux/etc/hosts Win95/98/MEC:\windows\hosts Win NT/2000/XP ProC:\winnt\systems32\etc\hosts Win XP HomeC:\windows\system32\drivers\etc\hosts

Subverting IP Look-Up In general, not used for phishing. Economic Damage Hillary for Senate campaign attack. Hiding illegal websites. (Kiddie Porn) DNS Server Sabotage IP Forwarding

Subverting IP Look-Up Port Forwarding URLs allow port numbers. Legitimate business at default port number. Illegitimate at an obscure port number. Screen clicks Embed small picture. Single pixel. Forward from picture to the illegitimate site. Easily detected in HTML source code. Password screens Depending on access control, access to different sites.

Phisher-Finder Carefully investigate the message to find the URL. Do not expect this to be successful unless the phisher is low- tech. Capture network traffic with Ethereal to find the actual URL / IP address. Use Sam Spade or similar tools to collect data about the IP address.

Phisher-Finder Capture network traffic with Ethereal when going to the site. This could be dangerous. Disable active webpages. Do not use IE (too popular). Look at the http messages actually transmitted. Expect some cgi etc. script.

Phisher-Finder Investigation now needs to find the person that has access to the website. This is were you can expect to loose the trace. The data entered can be transmitted in various forms, such as anonymous . For example, they can be sent to a free account. IPS usually has the IP data of the computer from which the account was set up and from which the account was recently accessed. Perpetrator can use publicly available computers and / or unencrypted wireless access points. Investigator is usually left with vague geographical data.