Securing the Tor Network
|
|
|
- Norman Jefferson
- 10 years ago
- Views:
Transcription
1 Securing the Tor Network Black Hat USA 2007 Supplementary Handout Mike Perry This handout is not a standalone document. It is intended to be used in conjunction with the presentation slides, and together the two documents should be sufficient to serve as a comprehensive artifact of the presentation. The speaker will refer to some figures and pages by number during the presentation.
2 Tor Routing Tor traffic is routed through 3 nodes by default: Guard, relay, and exit. In normal operation, a given user only has 2 guard nodes that they use exclusively. The relay node is chosen arbitrarily, and the exit node is chosen according to its exit policy, which specifies which IPs and ports it will connect to. Paths are changed roughly every 10 minutes. Illustration 1: Routing Diagram This diagram illustrates two important properties of Tor. First, the two clients illustrate the multiplexing of multiple circuits over a single node-to-node TLS connection. Second, the bottom client illustrates the stream multiplexing capability: multiple TCP connections can be carried over a single Tor circuit. Each node knows only the source and destination pairing for a circuit. It does not know the whole path. Illustration 2: Tor Encryption This diagram illustrates the Tor circuit level encryption mechanism. Node-level communications are encrypted with TLS connection. Inside this, the Tor Directory lists public keys that the client uses to establish the three secret AES session keys between itself and each successive hop in the circuit. Page 2
3 Points of Attack Illustration 3: Attack Points There are obviously a lot of attack points here, some more serious than others, and some can be performed in a few different ways. The following are worth discussing in extended detail: 1. Application Layer Attacks. These attacks revolve around feeding the application some type of data that either causes it to bypass proxy settings, reveal crucial user information, or otherwise outright exploit it. Note that there are actually three positions that this type of attack can be performed (exit, transit, and destination), and all three have been observed in the wild. A particularly surprising example of this type of attack is an exit node spoofing a content element from mail.google.com and fetching your gmail account cookie and downloading all your mail, even though you were not visiting any Google-related sites at the time. Google's insistence (and Yahoo's and Hotmail's too for that matter) on allowing non-https access makes this attack an easy target from not only Tor, but your local coffee shop also (or the Defcon network!). Yet another great reason to clear your cookies regularly. 2. Intersection Attacks. In my opinion, intersection attacks are currently the second most dangerous attack against Tor, behind application layer attacks. Intersection attacks essentially rely on correlating several distinct properties of Tor users to match pseudonymous Tor activity to that user, and function best if there are few Tor users using the network. This obviously covers a wide range of concrete attacks, but the most surprising instance I am aware of is the case of a university Page 3
4 student who was conducting an online scam somehow related to his or her university.[1] Since few people are currently willing to put up with Tor's slow (and irregular) connection speeds, it was a trivial matter for local network administrators to interrogate the only two regular Tor users on campus. This is not to say that running scams via Tor is something we would like to encourage or protect, but this underscores the fact that Tor network popularity is actually a key component of Tor network security for others who need more legitimate anonymity.[2] 3. Active Circuit Failure Attacks. Guard nodes can actively fail circuits if they do not extend to their colluding peers. If they are able to find a valid side channel either within the Tor protocol or just using timing information, they may be able to perform this attack at the guard and exit position only. In the degenerate case, however, they can continue to fail each successive circuit extend until a colluding peer is chosen for that hop. This attack underscores the fact that reliability is yet another key factor of security in anonymity networks. Note that various properties of Tor make this attack slightly less straightforward in practice, however. The user typically has at least 2, but usually more guards, and the Tor client will switch to a randomly selected guard each time the circuit fails. However, lying about bandwidth to a degree proportional to the percentage of circuits failed before one succeeds can allow nodes to maximize their potential for damage, since they will be carrying less traffic due to failing circuits causing the clients to sometimes move elsewhere. 4. Timing Correlation Attacks. Timing correlation attacks attempt to use connection time, duration, and flow characteristics to correlate the client's connection to a guard node to an external exiting connection. An active adversary can also introduce their own timing patterns into this traffic. Academic studies have shown that this attack can be extremely effective in simulation[3]. However, it still remains to be seen how particular details of the Tor network affect the ability to carry out this attack. In particular, unanswered and interesting research questions include: To what degree does Tor's stream multiplexing frustrate this? At what point does the number of users exceed the bits of information that can be reliably obtained from timing information in a passive attack? How much more difficult is it to perform this attack externally than internally? Running Tor as both a client and a node should greatly improve your resistance to both internal and external versions of this attack. Is this quantifiable, though? Page 4
5 Centralized Bandwidth and Load Scanning Centralized bandwidth scanning divides the network into groups of nodes based on their reported speed, and fetches large files via paths that consist entirely of nodes with reported speeds close to theirs. The locally observed bandwidth is then recorded for each node in the path, and divided into its reported bandwidth to obtain an estimated number of concurrent full-capacity streams passing through that node. S=B/L. Since Tor attempts to load balance proportional to node's claimed bandwidth, nodes that lie about their capacity will end up carrying many more streams than they usually would, and will be greatly overloaded, and will exhibit very low observed values for L, and thus high values for S. Like all centralized scanning approaches, centralized bandwidth scanning is not without its limitations. Scanner IPs will exhibit very obvious repetitive traffic patterns to guard nodes, and exit nodes can come to recognize test URLs. Once the scanner activity is recognized, scanner traffic can be prioritized to give the illusion of higher capacity. Workarounds for these issues include infrequent, short duration scanning, as well as only counting statistics for the middle node, who is unable to easily recognize scanned content. Interesting Items Found During Network Scanning 1. Chinese ISP doing MITM on SSL 2. Regional ISPs inserting popup blocker Javascript into HTTP streams 3. DNS spoofing 4. Upstream caches caching stale content 5. Verified reports of MITM on SSH, SSL 6. Disproved incorrect accusations of bandwidth lying 7. Instances of overloaded nodes due to strange exit policies and load balancing bugs Decentralized Network Scanning Decentralized failure scanning is still in proposal form as part of the Two Hop Paths Tor Proposal #115.[4] Google Summer of Code participant Johannes Renner is also conducting research on the effectiveness of node-based scanning as a part of his Master's Thesis on improving Tor's path selection. Page 5
6 Tor's Web Attack Profile 1. Ways to bypass Tor/Proxy Settings (a) Java 1.5 Socket API allows code to override Java proxy settings i. Does this sound like a good feature for secured environments in general?? (b) Plugins handle their own network code and settings (c) Delayed execution until Tor is disabled i. meta-refresh tags ii. Timers and Events iii. Busy waiting 2. Correlation of Tor vs Non-Tor (a) Cookies i. Exits can spoof elements from fruitful SSL-sloppy domains such as mail.google.com (b) Cache Data i. Cached objects can contain deliberately constructed unique identifiers 3. History Disclosure (a) Enumeration of link tag style attributes in Javascript i. (b) Using CSS to fetch specific background images for visited styles. No Javascript needed. i Location artifacts (a) Timezone (b) Locale, charset 5. Misc anonymity set reduction (a) OS version/user agent 6. History records/disk state (a) Some users are at risk simply for using Tor. Their computers may be confiscated/examined. Page 6
7 TorButton Options Disable plugins on Tor Usage This option is key to Tor security. Plugins perform their own networking independent of the browser, and many plugins only partially obey even their own settings. Isolate Dynamic Content to Tor State Another crucial option, this setting causes the plugin to disable Javascript on tabs that are loaded during a Tor state different than the current one, to prevent delayed fetches of injected URLs that contain unique identifiers, and to kill meta-refresh tags. It also enables an nsicontentpolicy that prevents all fetches from tabs with an opposite Tor state to block non- Javascript dynamic content such as CSS popups. Hook Dangerous Javascript This function enables the Javascript hooking code. Javascript is injected into the DOM (and then removed immediately after executing) to hook the Date object to mask timezone, and to hook the navigator object to mask OS and user agent properties not handled by the standard Firefox user agent override settings. Disable Updates During Tor Many extension authors do not update their extensions from SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to existing extensions. Disable Search Suggestions during Tor This optional setting governs if you get Google search suggestions during Tor usage. Since no cookie is transmitted during search suggestions, this is a relatively benign behavior. Block History Reads during Tor/Non-Tor Based on code contributed by Collin Jackson[5], this is actually two settings, but are combined here for brevity since the effect is the same. When enabled and the corresponding Tor state is active, this setting prevents the rendering engine from knowing if certain links were visited. This mechanism defeats all document-based history disclosure attacks, including CSS-only attacks. Block History Writes during Tor/Non-Tor This setting prevents the rendering engine from recording visited URLs, and also disables download manager history, form field history, and disables remembering login information. Note that if you allow writing of Tor history, it is recommended that you disable non-tor history reads, since malicious websites you visit without Tor can query your history for.onion sites and other history recorded during Tor usage (such as Google queries). Page 7
8 Disable Session Saving This option disables the session store, which stores your session in the event of browser upgrades and crashes. Since the session store can be written at random times and a browser crash or upgrade can cause you to refetch many Tor urls outside of Tor, currently this is an allor-nothing setting for both Tor and Non-Tor. Clear History During Tor Toggle This is an alternate setting to use instead of (or in addition to) blocking history reads or writes. Block Tor disk cache and clear all cache on Tor Toggle Since the browser cache can be leveraged to store unique identifiers, cache must not persist across Tor sessions. This option keeps the memory cache active during Tor usage for performance, but blocks disk access for caching. Block disk and memory cache during Tor This setting entirely blocks the cache during Tor, but preserves it for Non-Tor usage. Clear Cookies on Tor Toggle Fully clears all cookies on Tor toggle. Store Non-Tor cookies in a protected jar This option stores your persistent Non-Tor cookies in a special cookie jar file, in case you wish to preserve some cookies. Contributed by Collin Jackson.[5] Manage My Own Cookies This setting allows you to manage your own cookies with an alternate extension, such as CookieCuller[6]. Note that this is particularly dangerous, since malicious exit nodes can spoof document elements that appear to be from sites you have preserved cookies for. Clear cookies on Tor/Non-Tor shutdown This setting uses the Firefox Private Data settings to clear cookies on Tor and/or Non-Tor browser shutdown. Set user agent during Tor usage User agent masking is done with the idea of making all Tor users appear uniform. A recent Firefox Windows build was chosen to mimic for this string and supporting navigator.* properties, and this version will remain the same for all TorButton versions until such time as specific incompatibility issues are demonstrated. Uniformity of this value is obviously very important to anonymity. Note that for this option to have full effectiveness, the user must also allow Hook Dangerous Javascript ensure that the navigator.* properties are reset correctly. The browser does not set some of them via the exposed user agent override preferences. Page 8
9 Javascript Hooking Firefox extension development is a maze of (extremely powerful) black voodoo magic and cryptic interfaces that allow you to customize just about every aspect of the browser and browser components via Javascript and XML. However, the one thing they lack is the ability to configure your timezone. Hence, regular client-side Javascript can query the Date object to determine your approximate geographic location. Luckily, it turns out that Javascript is actually a pretty flexible language. Through a combination of object oriented functionality and lexical scoping, it is possible to create wrappers to existing objects while still concealing the original implementation, and to do all this at the same privilege level as client-side Javascript without risk of subversion. The approach is to create a nsiwebprogresslistener to listen for location change events to alert you as soon as a new document's DOM is first created. At this point, you create a custom script tag, insert it into the DOM (this causes the script to immediately run), then remove it. The key to the whole operation is to make sure that all of your references to the original object exist only as local variables that just happen to be in the same scope as the functions you are hooking (this works because of lexical scoping). In my case, this is what prevents the adversary from just calling the internal wrapped Date implementation. To make it a bit more difficult to fingerprint TorButton users, all other variables are direct properties of 'window', and can be deleted from that object using the hash syntax and the delete operator. A skeleton sketch of the injected code is below. For the support code that does the injection, see the TorButton.xpi source code (in particular, torbutton_weblistener in torbutton.js). Page 9
10 window. HookObjects = function() { if( tb_set_uagent) { var tmp_oscpu = window. tb_oscpu; navigator. definegetter ("oscpu", function() { return tmp_oscpu;}); /*... */ } var tmp = Date; Date = function() { var d; /* DO NOT make 'd' a member! EvilCode will use it! */ var a = arguments; if(arguments.length == 0) d=new tmp(); /*... */ Date.prototype.getYear=function() {return d.getutcyear();} Date.prototype.getMonth=function(){return d.getutcmonth();} Date.prototype.getDate=function() {return d.getutcdate();} Date.prototype.getDay=function() {return d.getutcday();} /*... */ /* Hack to solve the problem of multiple date objects all sharing the same lexically scoped d every time a new one is created. This hack creates a fresh new prototype reference for the next object to use with a different d binding. It doesn't break stuff because at the start of this function, the interpreter grabbed a reference to Date.prototype, and this new assignment does not affect the interpreter's reference. During this function we modified Date.prototype to create the new methods with the lexically scoped d reference. */ Date.prototype = new Object.prototype.toSource(); return d.toutcstring(); } Date.now=function(){return tmp.now();} Date.UTC=function(){return tmp.apply(tmp, arguments); } } if (window. HookObjects) { window. HookObjects(); delete window[' HookObjects']; delete window[' tb_set_uagent']; delete window[' tb_oscpu']; } Page 10
11 References 1. p2pnet news. Professor in Tor Trouble. Feb 9, Roger Dingledine and Nick Mathewson. Anonymity Loves Company: Usability and the Network Effect. In the Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright. Timing attacks in low-latency mix-based systems. In Ari Juels, editor, Proceedings of Financial Cryptography (FC 04). Springer-Verlag, LNCS 3110, February Mike Perry. Two Hop Paths Tor Proposal # Collin Jackson. Contributed Code to FoxTor Dan Yamaoka. CookieCuller Firefox Extension. US/firefox/addon/82 Page 11
Torbutton and Firefox. Mike Perry Mozilla Brown Bag Jun 22, 2010
Torbutton and Firefox Mike Perry Mozilla Brown Bag Jun 22, 2010 Topics For Today 1. Torbutton's Adversary Model and Requirements 2. Torbutton Functional Overview and Demo 3. Torbutton Architecture & Major
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
365-Day: HTTPS Cookie Stealing. Mike Perry Riverbed Technology DEFCON 2008
365-Day: HTTPS Cookie Stealing Mike Perry Riverbed Technology DEFCON 2008 Who am I? Volunteer Tor developer Work on Torbutton, TorFlow Privacy advocate, censorship opponent Forward+Reverse Engineer at
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Integrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure [email protected] Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009
PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation
PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008
PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Detecting Denial of Service Attacks in Tor
Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is
Snapt Balancer Manual
Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
IBackup Drive User Guide
IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
SSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
What should I do if I have problems with my account statement?
Internet: Availability & Ordering Will I have to change my email address? If you currently have an e-mail address from an internet provider that you will be disconnecting after your NeuBeam service is
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Regain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Taleo Recruiting 7.5. Technical Requirements and Configuration Guidelines for Candidates. Software Version: 7.5 SP11
Taleo Recruiting 7.5 Technical Requirements and Configuration Guidelines for Candidates Software Version: 7.5 SP11 January 2010 Information Confidentiality It shall be agreed by the recipient of the document
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
HTTPS:// Secure HTTP
The CRIME attack HTTPS:// Secure HTTP HTTPS provides: Confidentiality (Encryption), Integrity (Message Authentication Code), Authenticity (Certificates) CRIME decrypts HTTPS traffic to steal cookies and
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
