Download presentation
Presentation is loading. Please wait.
Published byLuke Benson Modified over 9 years ago
1
Web Defacement Anh Nguyen May 6 th, 2010
2
Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2
3
Introduction – Web Defacement – Hackers Motivation – Effects on Organizations How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 3
4
Introduction Web Defacement Occurs when an intruder maliciously alters a Web page by inserting or substituting provocative and frequently offending data Exposes visitors to misleading information 4
5
Introduction Web Defacement http://www.attrition.org/mirror/attrition/ – Tracks of defacement incidents and keeps a “mirror” of defaced Web sites 5
6
Introduction Hackers Motivation Look for credit card numbers and other valuable proprietary information Gain credibility in the hacking community, in some high profile cases, 15 minutes of fame through media coverage of the incident 6
7
Introduction Effects on Organizations Organizations lose – Credibility and reputation – Customer trust and revenue – E-retailers can lose considerable patronage if their customers feel their e-business is insecure – Financial institutions may experience significant loss of business and integrity 7
8
How Hackers Deface Web Pages Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 8
9
How Hackers Deface Web Pages Obtain usernames – Use information-gathering techniques – Make use of publicly available information Domain registration records – Use ‘social engineering’ tactics Call an employee and pose as a system administrator 9
10
How Hackers Deface Web Pages (Cont.) Guess passwords – Go through a list of popular or default choices – Use intelligent guesses – Use ‘social engineering’ tactics Birth dates Names of family members 10
11
How Hackers Deface Web Pages (Cont.) Obtain administrator privileges Perform additional information gathering to find out useful tidbits – The exact version and patch levels of the OS – The versions of software packages installed on the machine – Enabled services and processes 11
12
How Hackers Deface Web Pages (Cont.) Access well-known Web sites and locate hacks that exploit vulnerabilities existing in the software installed Gain control of the machine and modify the content of pages easily 12
13
How Hackers Deface Web Pages (Cont.) Sechole An example of a privilege escalation exploit on Windows NT4 The attack modifies the instructions in memory of the OpenProcess API call so it can attach to a privileged process Once the privileged process runs, the code adds the user to the Administrators group The technique works if the code runs locally 13
14
How Hackers Deface Web Pages (Cont.) Sechole In the presence of Microsoft’s Internet Information Server (IIS) Web server and some other conditions, Sechole can be launched from a remote location 14
15
How Hackers Deface Web Pages (Cont.) Sechole Another approach is to exploit vulnerabilities in Internet servers that are listening to open ports – No need to log on to the server – Execute malicious code over an open legitimate connection 15
16
How Hackers Deface Web Pages (Cont.) IIS Hack Well-known example for a remote attack on the IIS Web server Hackers exploit a buffer overflow weakness in lsm.dll, causing malicious code to execute in the security context of the System on the server 16
17
Solutions to Web Defacement Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 17
18
Solutions to Web Defacement Firewalls – Do not scan incoming HTTP packets – HTTP attacks (such as IIS Hack) are not detected Network-based Intrusion Detection Systems (NIDS) and Host- based Intrusion Detection Systems (HIDS) – Listen to packets on the wire, but do not block them – In many cases, the packet reaches its destination before it is being interpreted by the NIDS 18
19
Solutions to Web Defacement (Cont.) Integrity assessment – A hash code (similar to a checksum) for a Web page reflecting the page’s content is computed – The saved hash code is periodically compared with the freshly computed one to see if they match – The frequency of the hash code comparisons needs to be high – The scheme collapses when pages are generated dynamically 19
20
Solutions to Web Defacement (Cont.) Multi-layered protection system – Needed in order to effectively deal with Web defacement – On-the-spot prevention Attack s should be identified before their executions, i.e. they should be identified at the service request level Use system call and API call interception 20
21
Solutions to Web Defacement (Cont.) Multi-layered protection system (Cont.) – Administrator (root) resistant Allow only specific predefined user (the Web master), instead of the ‘Administrator’ account, to modify the Web site content and configuration – Application access control A single predefined program should be used to edit and/or create Web pages – OS level protection 21
22
Solutions to Web Defacement (Cont.) Multi-layered protection system (Cont.) – HTTP attack protection A protection module that scans incoming HTTP requests for malicious requests, even when the communication is encrypted, should be used – Web server resources protection Executables Configuration files Data files Web server process 22
23
Solutions to Web Defacement (Cont.) Multi-layered protection system (Cont.) – Other Internet server attack protection Bind (a DNS server) Sendmail (an SMTP server) 23
24
Conclusions Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 24
25
Conclusions Thank you for your time Questions and feedback are welcome 25
26
References Prevent Web Site Defacement – http://www.mcafee.com/us/local_content/white_ papers/wp_2000hollanderdefacement.pdf 26
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.