Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security, CS6262 Richard G. Personal Information Masquerading, Profiling, Snooping.

Similar presentations


Presentation on theme: "Network Security, CS6262 Richard G. Personal Information Masquerading, Profiling, Snooping."— Presentation transcript:

1 Network Security, CS6262 Richard Bailey—richard@magichappyplace.com G. Stepanov—gstepanov@gatech.edu Personal Information Masquerading, Profiling, Snooping

2 Agenda 1. Motivation & Goals 2. What we accomplished 3. How we did it & How to fix it 4. Future Work 5. Q & A

3 First, a survey Do you use: Amazon.com Gmail Facebook Instant Messaging services Is it okay if any of these are compromised? Do you think about exposure of your personal information to anybody that cares to look?

4 Our Goals… 1. Determine exposure of personal information when using common web sites 2. Construct visualization of exposed data 3. Compromise these sites allowing us to take unauthorized actions as another person 4. Automate this entire process (time permitting)

5 Goal #1, #2 (Assess & Visualize) Clearly everything transmitted via HTTP instead of HTTPS is exposed

6 Goal #3 (Attack) Dealing with “secure” commercial websites Attack vector is the cookies used to identify your session SSL: GET /loginPage.php SSL: 200 OK SSL: POST /loginPage.php SSL: 200 OK, here are some cookies HTTP: GET /privateInfo.php, here are my cookies Evil blackhat nose sniffs your session!

7 Goal 4 (Automate) Facebook Spider Gets Friends Employment history Misc. personal info.pcap scrapers Amazon browsing history GMail URLs (beginning of automation) Cookies for masquerade attack Firefox plugin to load cookies from scrapers

8 How to fix this Use SSL all the time (GMail) Establish session key during authentication. Keep this secure by not transmitting it in clear text. Use this to encrypt your data on the client side. Sign your requests with a hash involving the requesting IP (or the secure session key and a timestamp)

9 Future Work Complete the automation process Implement proof of concept that does fully secure communication from the client

10 Summary / Q&A Wireless is convenient but should not be trusted We step into sessions allowing us to steal information about people Attacking the session allows us to go beyond just using sniffed data Each website leaks a little information that can be collected into a profile of the user


Download ppt "Network Security, CS6262 Richard G. Personal Information Masquerading, Profiling, Snooping."

Similar presentations


Ads by Google