Week 7 - Wednesday.  Web security – user side.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Security Issues and Challenges in Cloud Computing
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Happy Hacking HTML5! Group members: Dongyang Zhang Wei Liu Weizhou He Yutong Wei Yuxin Zhu.
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
School of Computing and Information Systems CS 371 Web Application Programming Security Avoiding and Preventing Attacks.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security fundamentals Topic 9 Securing internet messaging.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Week 8 - Monday.  Exam 1 post mortem  Web attacks targeting users.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
For more information on Rouge, visit:
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
Tonga Institute of Higher Education IT 141: Information Systems
How do Web Applications Work?
IT Security  .
ISYM 540 Current Topics in Information System Management
CS 371 Web Application Programming
Tonga Institute of Higher Education IT 141: Information Systems
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Lecture 2 - SQL Injection
Tonga Institute of Higher Education IT 141: Information Systems
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Week 7 - Wednesday CS363.
Presentation transcript:

Week 7 - Wednesday

 Web security – user side

 Website defacement is when an attacker changes the content of a legitimate website  Usually, this is done by exploiting a weakness in authentication of the people who are allowed to update content  These attacks can be pranks  They can be done to demonstrate that security is poor  Often to embarrass government websites  They can be done to show political disagreement with the website or the agency behind the website  The changes could be subtle enough that the change is not noticed for a while

 Websites are easy to fake  By their nature, the HTML, JavaScript, CSS, and images used to create a website are all publically available  It's even possible to link to current images on the real website  This attack is usually designed to trick users into entering private information into the malicious website

 Detecting that a change has occurred on a website can be difficult  One approach is to make a hash value of the website  Store the hash elsewhere, securely  Hash the contents of the website periodically to see if it still matches  This approach only works if the data doesn't constantly change  Digital signatures allows companies to sign code to verify that they did originate the code  Example: ActiveX controls  You shouldn't be running this kind of code anyway

 The goal of website defacement is usually to embarrass the website  It's meant to be noticed!  Substitute content is when malicious content (infected downloads, links to other malicious sites) are put on legitimate websites  Just because your link is to the right website doesn't mean that it hasn't been compromised

 Only a website you visit can leave a cookie or run JavaScript, right?  Sure, but how many sites do you visit?  Images that are linked to other websites (especially ads) count as visiting other websites  Visiting a single page could store cookies from every ad on the page (and more!)  Web bugs are images that are usually 1 x 1 pixels and clear  They make it impossible to know how many sites could be storing cookies

 Clickjacking is when you think you're clicking on one button, but you're really clicking on another  It could be that you're agreeing to download or install a program that you don't think you are  Called a drive-by download  It could be that you think you're entering data into a real website, but it's just a front for a malicious one  These attacks are possible because web pages can have transparent frames, allowing you to see something that you're not really interacting with

 The inherently unsecure model used for web interactions has a number of weak points  Some ways that website data can be leaked include:  Cross-site scripting  SQL injection  Dot-dot-slash  Server-side includes

 Cross-site scripting (XSS) is when executable code is added to what should be purely a transmission of data  Often, this is done by adding JavaScript to a URL so that a script is executed when clicking on a link  Example from Wikipedia: 

 Like the example with Bobby Tables, an SQL injection attack is one in which SQL code, often embedded in a URL, is manipulated to perform additional functions  Example:  Original: "SELECT * FROM trans WHERE acct='2468'"  Modified: "SELECT * FROM trans WHERE acct='2468' OR '1' ='1'"

 As you know,../ refers to the directory above the current one  On some systems, requesting a file several directories up could allow access to privileged information  Example: secret.txt

 A server-side include is data in the webpage that the server interprets as a command  Example:  The web content must somehow be manipulated to make the server generate the given HTML  Likewise, some knowledge of how a server interprets content and what commands are available is needed

 There is lots of fake out there  The book calls spam fake or misleading e- mail  Several kinds of spam are rising  Fake "Your message could not be delivered" messages  Fake social networking messages  Current events messages  Shipping notices

 Kaspersky estimates that spam was 68-71% of all in 2014  Symantec had similar numbers of 60-70% in 2013 and 2014  69.7% of spam had sexual or dating content  17.7% was pharmaceuticals  6.2% was about jobs  Top spam generators  China (22.93%)  US (19.05%)  South Korea (12.81%)

 Advertising black- or graymarket pharmaceuticals  Pump and dump – artificially inflating the price of a stock  General advertising  Malware in the or in links from the e- mail  Advertising sites (such as porn) that might be illegal  Cost is virtually nothing

 Legal approaches  US CAN-SPAM act  Directive 2002/58/EC in Europe  It's hard to define what is and isn't spam  Most laws require an opt-out mechanism, but enforcement is hard  IP addresses are easy to spoof, but the next generation Internet might change that  Screening programs try to filter out spam (with both false positives and false negatives)  Some web hosting companies enforce volume limitations on how many s can be sent per day  Paying postage per ?

 SMTP is the protocol for sending  It's very straight-forward  The from field is easy to spoof  As people saw in Networking last semester  There are protocols with authentication built in, but regular SMTP is entrenched how  You can never trust header information in an

 Phishing is when an tries to trick someone into giving out private data or doing something else unsafe  Spear phishing is phishing that targets a specific individual  Details about that user's life or accounts might be included  Whaling is a term used for spear phishing of rich people or celebrities  They have more money  Many of their personal details could be public

 PGP (Pretty Good Privacy) is a system that uses the encryption mechanisms we described to send safe s  The public key system uses a decentralized web of trust where you add your friends’ keys to your web and get keys for their friends and friends of friends  S/MIME is a standard that is like PGP, but it uses hierarchies of trust based on certificates from central authorities instead of a web

 OS background  Designing secure operating systems

 Read sections 5.1 and 5.2  Keep working on Project 2  Have a good Spring Break