Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
By Hiranmayi Pai Neeraj Jain
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Cross Site Scripting a.k.a. XSS Szymon Siewior. Disclaimer Everything that will be shown, was created for strictly educational purposes. You may reuse.
Security Issues and Challenges in Cloud Computing
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
UWWD In our quest to eliminate bad websites, we present…. HALLELUJAH!!
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
The Internet & The World Wide Web Notes
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureSurf Protect your users when surfing the Internet.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Data Security.
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
JavaScript, Fourth Edition
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 1 – Lesson 6 Ms. Tracy. Bell Ringer What is the typical useful life for a personal computer?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Javascript worms By Benjamin Mossé SecPro
TOPIC: Web Security (Part-4)
Finding and Fighting the Causes of Insecure Applications
Cross-Site Request Forgeries: Exploitation and Prevention
Finding and Fighting the Causes of Insecure Applications
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Active Man in the Middle Attacks
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation 6 th OWASP AppSec Conference Milan - May Overtaking Google Desktop Leveraging XSS into Mayhem Yair Amit Senior Security Researcher, Watchfire ext 4039

6 th OWASP AppSec Conference – Milan – May Presentation Outline  Background  Google Desktop Overview  Overtaking Google Desktop – Step by Step  Impact  What harm can a malicious attacker do?  Attack characteristics  Lessons learned  Q&A

6 th OWASP AppSec Conference – Milan – May 2007 Background  XSS  The most widespread web-application vulnerability  WASC Web Application Security Statistics Project (  Used to be perceived as an identity theft attack  XSS has so much more to offer. It has teeth!  Change settings and steal data from attacked victim account  Web worms (Samy)  What we are about to see…  Stealth attack  Sensitive information theft from the local computer  Command execution 3

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop - Overview  Purpose: provide an easily to use and powerful search capability on local and other personal content  Some traits:  Runs a local web-server for interaction (port 4664)  Google.com like interface  Uses a service to run the indexing  User interface is almost purely web  Preferences control what to index, and indexing can be broad  Office documents, media files, web history cache, chat sessions, etc.  Easily extendible  Special integration with Google.com 4

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop Security Mechanisms  Web server only accessible from localhost  Not available from network 5

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop Protection Mechanism (cont.)  The main threats are XSS and CSRF attacks  Every request (except some images) has a unique signature  Signature is generated using a strong key stored in the registry  If signature doesn’t match query, request is denied  Key is different per installation  Signatures cannot be deduced from one installation to another  A powerful protection against XSS and CSRF 6

6 th OWASP AppSec Conference – Milan – May 2007 Signatures Protection Strength Example 7

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop Vulnerability – Sticky XSS  Available through the “under” keyword  For searching under specific folders in the hard-drive or a network drive.  XSS is Sticky  Saved in the history of the “under” option  Stickiness applies to all search results  “Under” history shown on all search results (added for usability)  Stickiness requires 3 “overwrites” to be cleared  How can this vulnerability be exploited, given the protection mechanisms?  ags=68&num=10&s=9pKHqow9s-J4YfGgBjGF75g- ZwM 8

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop & Google.com integration  Google Desktop interjects between browser and website, and adds content  Google Desktop search results are displayed in Google.com’s results  ‘Desktop’ link – our way in… 9

6 th OWASP AppSec Conference – Milan – May 2007 Google Desktop & Google.com integration: Our way in  JavaScript on site has access to modified content  Signature can be harvested  Interesting point: Google.com-originating searches all use the same signature  This cannot be turned off…  Possible in newer versions  Attacker needs control over victim’s browser in Google.com context… 10

6 th OWASP AppSec Conference – Milan – May 2007 Google.com XSS Vulnerability  Standard XSS  For the purpose of this demonstration, a UTF-7 XSS vulnerability on search page is used.  Can apply to any XSS on Google.com and some of its subdomains  And there are plenty of those… 11

6 th OWASP AppSec Conference – Milan – May 2007 Complete overtaking process  Perform Google.com XSS exploit  Through SPAM mail, talkback links, social networks worms, etc. – the usual way  Injected JavaScript will do the rest…  Harvest the key from the search results  Infect the local machine by issuing XSSed Google Desktop search query (using the acquired signature)  Hide all traces of that occurring…  The system is now fully compromised! 12

6 th OWASP AppSec Conference – Milan – May 2007 What harm can a malicious attacker do?  Take advantage of Google Desktop’s powerful search and indexing capabilities  Search for sensitive information  Change user preferences to index more local information  “Search Across Computers”  Hijacking information with style. ;)  Execute commands through Google Desktop  Change preferences to index network drives  Complete takeover… 13

6 th OWASP AppSec Conference – Milan – May 2007 Web User Interface…  Attacker controls what the victim sees!  Hide changed preferences options  Hide version  Make the user think he’s using a more current version  Auto-correction if “under” parameter is used with other values  Makes sure the JavaScript malware remains active 14

6 th OWASP AppSec Conference – Milan – May 2007 Attack Characteristics  Low footprint  No need for malicious binary code to be injected  The code is automatically executed by the browser when visiting legitimate Google Desktop Web pages  Easy data leakage  Hijacked information can be covertly leaked back to the attacker via seemingly innocent encoded requests to an external Web site  Almost undetectable  No mangled URL in the address bar  The attack continues to persist across sessions and across browsers 15

6 th OWASP AppSec Conference – Milan – May 2007 Other interesting points  Can be leveraged as CSRF platform  Internet Explorer mhtml redirection bug exploitation  isclosure_Vulnerability_Test/ isclosure_Vulnerability_Test/  Other persistent XSS exists in the “machine name” and “computer name” fields  Very useful for covering attack traces  Latest versions of Google Desktop contain a fix  XSS vulnerabilities  ‘Desktop’ link integration is now configurable  The dangers are still here 16

6 th OWASP AppSec Conference – Milan – May 2007 Lessons Learned  XSS is a big issue  Very common  Very dangerous  Sticky XSS is even worse  Should be taken more seriously in the development process  Applications like Google Desktop are risky  Access to sensitive information means greater risk for the user  RIA trend  Integration between web applications and desktop applications is risky  The attack took advantage of this integration in order to overcome powerful protection mechanisms  Classical functionality/security tradeoff  Antivirus vendors should find creative ways to fight JavaScript Malware 17

6 th OWASP AppSec Conference – Milan – May 2007 More Information  Short Overview: gle-Desktop-Short-Overview.pdf gle-Desktop-Short-Overview.pdf  White paper: rtaking-Google-Desktop.pdf rtaking-Google-Desktop.pdf  Video Demo (11 Minutes): mo/index.htm mo/index.htm 18

6 th OWASP AppSec Conference – Milan – May 2007 Thank you! 19