Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.

Slides:



Advertisements
Similar presentations
InterScan AppletTrap Zhang Hong Trend Micro, AppletTrap Team (Nanjing)
Advertisements

Software Security & Privacy Risks in Mobile E-Commerce Kartikeya Kakarala CSCI 5939-Independent Study Wireless Application Protocols.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Chapter 17: WEB COMPONENTS
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Chapter 4 Application Security Knowledge and Test Prep
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
1 6 Chapter 6 Implementing Security for Electronic Commerce.
INTRODUCTION TO WEB DATABASE PROGRAMMING
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Masud Hasan Secue VS Hushmail Project 2.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
JavaScript, Fourth Edition
Lesson 15 Client Side Vulnerabilities and you. Active Server Pages MS’s answer to the scripting world of PERL and CGI on Unix Usually Written In Visual.
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Protecting Students on the School Computer Network Enfield High School.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CP476 Internet Computing CGI1 Cookie –Cookie is a mechanism for a web server recall info of accessing of a client browser –A cookie is an object sent by.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
1 Mobile Code l Java Review –Java code is platform independent and runs within a “sandbox”, or a set of restrictions that keep downloaded applets from.
Security fundamentals Topic 8 Securing network applications.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Understand Internet Security LESSON Security Fundamentals.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Web Programming Language
TMG Client Protection 6NPS – Session 7.
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
World Wide Web policy.
Security+ All-In-One Edition Chapter 15 – Web Components
Presentation transcript:

Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14

Overview Executable Content Client/Server Computing Maintaining State

Executable Content Sometimes called active content or mobile code ActiveX controls and Java Applets Scripts: Java Script and VBScript Browser plug-ins that execute graphic and audio files All these “enrich” your web browsing experience

Client/Server Computing Executable Contents: Help achieve wide-scale info distribution Advances client/server computing Exploits “push” technology through filtered sites – Relevant data pushed at pre-defined time intervals

Client/Server Computing Allows ability to implement intelligent pull models – WEB client programmed to learn user preferences

WHAT IS ACTIVE X MS Framework that allows programs encapsulated in units called controls to be embedded in Web pages. Web browsers that support ActiveX allow Active X controls (programs) to download and execute on their machines. These programs can do whatever you program them to do....even execute damaging code. ActiveX is language independent, but platform specific They can only execute on Windows 32 machines

ActiveX CONTAINERS ActiveX Container: a technology used in many ActiveX applications ActiveX controls embedded within an ActiveX Container Provides sophisticated processing functions that work much like browser plug-ins Since Containers are designed independently they can work inconsistently (maliciously) when combined

ActiveX SCRIPTING Common Languages: Perl, VBScript, JavaScript, JScript (MS) Scripting can come from within ActiveX Controls Scripting can come from Web server--commands sent to client for execution Developer decides to mark Scripting as safe Client decides whether to accept scripting or reject

AUTHENTICODE MS Technology for thwarting malicious ActiveX code from executing on Windows platforms Provides two checks: –Verifies who signs the ActiveX code –Verifies integrity of ActiveX code Digital signatures issued by several Certification Authorities (CAs) provide the functionality Execution of this functionality is much like PKI –Upon download signature is stripped from ActiveX code and verified as from a valid CA –Then it is checked to see if software developer signed the code –Finally the downloaded code's hash is checked against the regenerated hash to verify integrity

AUTHENTICODE SECURITY Signature provides no assurance that code will work properly Technology works solely on a trust model Since advent of IE 4 the concept of security zones emerged –Local intranet zone –Trusted sites zone –Internet zone –Restricted sites zone User control (or lack there) of setting security policy can be debilitating

JAVA CHARACTERISTICS Multi-platform (MS, Mac, UNIX) language quickly finding acceptance Java applets on client machines add new layers of functionality Originally designed to run in embedded systems Are you ready for the talking refrigerator?

JAVA SECURITY APPROACH Java Sandbox is the Java Security Model Java Applet Sandbox constrains applets from accessing frangible resources Thus, Java Applet Sandbox model is based on restricting the behavior of the applet Signed applets now also being used Signed applets allow the applets to "play" outside the sandbox

JAVA SECURITY APPROACH Java Sandbox is the Java Security Model Java Applet Sandbox constrains applets from accessing frangible resources Thus, Java Applet Sandbox model is based on restricting the behavior of the applet Signed applets now also being used Signed applets allow the applets to "play" outside the sandbox

Maintaining State HTTP is a stateless protocol WEB sessions are considered connectionless CLIENT SERVER TCP DATA FLOW

Stateless Example Student SERVER TCP 3-Way Handshake SSL Connection Established HTTP Request for Web Page WEB PAGE SENT END CONNECTION REPEAT FOR EMBEDDED FILES

State Example(1) Student SERVER TCP 3-Way Handshake SSL Connection Established HTTP Request for Web Page END CONNECTION WEB PAGE SENT + COOKIE

State Example (2) Student SERVER TCP 3-Way Handshake SSL Connection Established HTTP Request for Web Page END CONNECTION GET COOKIE + SEND WEB PAGE

Cookies for Life Pros: Add state Increases Throughput Can Add Authentication

Cookies for Life Cons: Privacy issues – Collecting WEB usage data – Profiling WEB Visitors Security – Improper state tracking results in security holes – Cookie Hijacking (if client hacked)

HTTP Session Tracking URL Session Tracking Hidden Form Elements Cookies

HTTP Authentication Logon sequence generates session ID – Pass ID to browser URL Session Tracking – ID Passed in URL itself Hidden Form Elements – Within HTML Source Code Cookies Session ID can be passed over HTTP or HTTPS

Authentication Examples URL Session Tracking Hidden Form Elements Cookies EAZBKRBFCU101460

OTHER CLIENT SIDE VULNERABILITIES Browser Plug-ins –Plug-in: special software programs that are integrated with Web Browsers –Examples: RealAudio, Shockwave Attachments – The primary threat vector for viruses and installing hacker backdoors

Other Client Side Vulnerabilities Browser Flaws – Allow viewing of local files – Allow posting of files to your browser – Allow moving of files Using HTTP as mechanism to circumvent Firewall

E-Commerce Attack Scenario Use IIS Unicode Exploit – Put remote listener on WEB site – Listen on Port 80 – Send all Port 80 to Dr. Evil’s site – Logins and Passwords Captured – Sniffed password later used with HTTP proxy software to access your E-BANK

E-Commerce Attack Scenario Man-in-the middle attack – Dr. Evil injects himself in between you and the site – Installs HTTP Proxy Software to see what is being transferred on port 80 – Breaks tranmission path and inserts his own commands

Summary Picture 23 year old Geek Hacker Recent Advertising Quote: “ Today my worm will destroy: 18 days of revenue 1.7 million dollars of profit 4,000 lifetimes of greed. ” FEEL FREE TO GO HOME AND GET ON-LINE?