Presentation on theme: "1 Web Hacking Case Studies. 2 Web Site Hacking l Popular to get noticed, and to make a social or political point. l Used to embarrass press, rivals, or."— Presentation transcript:
1 Web Hacking Case Studies
2 Web Site Hacking l Popular to get noticed, and to make a social or political point. l Used to embarrass press, rivals, or others who the hackers disapprove of. l People get really concerned about Kevin Mitnick.
3 General Cases l People hacking web sites are usually, though not always, using old and well known security vulnerabilities. l Often times scripts are used to exploit problems, thus allowing a lower level of “hacker” to compromise the server. l Generally sites are vandalized, and occasionally information is stolen, but effects are usually localized.
4 General Situation l Many of the attacks can be avoided by reasonable or competent systems administrators. System or server configuration is usually a factor in the compromise. l Many attacks are unnoticed by the compromised site, due to lack of monitoring tools. l Systems administrators often times look at the local system, without considering the network and associated systems as a whole. * l Often times they don’t even look at the local system as a whole, but simply at the web server. *
5 Case Study: New York Times l Site compromised and defaced by HFG. l Content replaced with “3l33+” speak criticizing various columnists. l Interesting point is that the real messages were in HTML comments. l The messages also talked about how the site was compromised.. Via statd.
6 Comparable Case Studies l classifieds.penthouse.com –System compromised, and root obtained through rdist. l –Compromised through an S/Key vulnerability, ironically enough. l sps.motorola.com / –Compromised through an AIX hole, root obtained with -froot
7 Case Study: Yahoo l Site possibly compromised via a known web server hole in Apache. (General consensus) l Yahoo uses a web server based on apache, but varied off to handle its needs more exactly. Over time security problems were found and fixed in apache, but not propagated back to Yahoo. l The site compromised was running a PC-based Unix (FreeBSD) which made overflow code easier to build.
8 Overall Problems l Systems administrators too focused on exact task at hand, and not looking at the big picture. –This is often times a problem in a larger environment, as you have groups responsible for software, web sites, server management, security, firewalls, monitoring, networks, etc… l Lax administrators trusting all in-place security measures to protect them. (Lots of eggs, 1 Basket.) l Good analogy: Hard crunchy shell with a soft chewy center. (Paraphrase Marcus Ranum) l Unfortunately, VERY COMMON. l Fortunately, Easy to Fix.
9 Intro to E-Commerce l What is it? –Exchange of money or goods electronically. –From consumer to business, consumer to consumer, or business to business. l Examples: –Online purchasing –Content purchasing (Micro-Transactions) –Inter-Company EDI or Extranets –Stock management online –Auction/Classifieds
10 Simple Example l A site wants to put up an online store to well a new line of Widgets. Builds a pretty catalog and users can enter information. l Wants the site to be secure so has their provider install a secure web server for customers to use when placing orders. Will take credit card information and do real-time credit authorization. l Any Issues?
11 Simple Example Continued l What is the security of the provider? Is it a shared machine or a dedicated machine? l Is the order information stored in a database? Does this include credit information? What is the problem scope if the server is compromised? l Taxes? l How will credit authorization be handled? l What about product fulfillment? Who will ship the widgets? Will the fulfillment company have access to customer data? Are they secure?
12 Step by Step.. l The provider and machine security is similar to the problems that we have discussed, with the added issue that many companies cannot verify a providers claims and have to go off of face value. * l Storing customer information in a database is definitely an issue. Problems include: –Loss of customer confidentiality –Loss of orders if database attacked and destroyed –Potential compromise of customer credit information
13 More Steps l Credit authorization can be handled by many services, but some may be preferable to others. –As an example, CyberCash returns a “ticket” that can be stored, instead of the entire credit card information. This helps reduce the scope of liability, but introduces other problems. (Backorders..) l Product fulfillment is usually the biggest problem to handle. Companies will often times need to find a distributor to handle shipping, and these systems usually can’t be directly accessed. The problem that arises is backorders, and legally not being able to capture payment until a product is shipped.
14 Credit Card Processing l Two Basic Parts: Authorization & Capture l Authorization checks the card to see if the specified amount is accepted by the card company. –Returns approved, denied, or referral (call) l Capture –Transfers the actual money from the credit card company to the vendor or seller. (Legally cannot occur until product is delivered to consumer, or shipped from facility.)
15 Credit Cards Continued l Backend –There is obviously some data exchange between the company handling the transactions and the financial institutions to handle these tasks. l CyberCash or VeriFone have direct connections with lenders to handle this processing, as an example. Typically stores would not try to make direct connections to the banks as this would be a nightmare for banks and bank security.