Download presentation
Presentation is loading. Please wait.
Published byCharla Daisy Bryant Modified over 9 years ago
1
ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter: Chen Chih-Ming
2
2 Outline Introduction Term Design and Analysis Defenses Related work Concluding remarks
3
3 Term Puppetnet code Infected Server Puppet client Victim
4
4 Introduction To coerce web browsers to participate in malicious activities Not heavily dependent on the exploitation of specific flaws Not control over participating nodes completely Dynamic, short live target Indirect attack
5
5 Design and Analysis DDoS Worm propagation Reconnaissance probes Protocol other than HTTP Exploiting cookie-authenticated Distributed malicious computations
6
6 DDoS Hidden frame JavaScript loop Embed object Cache Add GET Connect limit of browser Use different host name
7
7
8
8
9
9
10
10
11
11
12
12 Worm propagation Code Red Attack IIS server Infecting process Server Viewer Victim
13
13
14
14
15
15
16
16
17
17 Reconnaissance probes Timing attack
18
18
19
19
20
20
21
21 Protocol other than HTTP SMTP IRC Trigging botnet
22
22 Exploiting cookie- authenticated Web mail Send victim’s mail to attacker
23
23 Distributed malicious computations JavaScript or Applet Crack password
24
24 Defenses Disabling JavaScript Careful implementation of existing defenses Filtering using attack signatures Client-side behavioral controls Server-side controls and puppetnet tracing Server-directed client-side controls
25
25 Disabling JavaScript Most sites employ JavaScript Just enable trusted site Reduce one order magnitude, but not eliminate Not attractive
26
26 Careful implementation of existing defenses Connection rate limiter Reduce one order magnitude, but not eliminate Still insufficient
27
27 Filtering using attack signatures For spam is ok DDoS is hard to make Not like string matching Need additional HTML parser Obfuscation of HTML Too complex
28
28 Client-side behavioral controls DDoS Impose controls on foreign request from a web page Affect web viewing, not good enough Worm Impose limiting amount of objects from different site Can evading by dns
29
29
30
30
31
31 Server-side controls and puppetnet tracing Block referrer, but still waste band Find referrer to take down attacking Not effective
32
32 Server-directed client-side controls Embed access control token in header Restrict requests per session Need public key to verify Modify server & client
33
33
34
34 Related work Web security XSS X-flash attack, like puppetnets
35
35 Concluding remark New class of web-based attack None of the strategies were complete satisfying Only partial solution
36
36 End Bye~
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.