Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Nick Feamster CS 6262 Spring 2009
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
Secure SharePoint mobile connectivity
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Amir Herzberg and Ronen Margulies Bar Ilan University 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Reading Data in Web Pages tMyn1 Reading Data in Web Pages A very common application of PHP is to have an HTML form gather information from a website's.
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Session 11: Security with ASP.NET
CHAPTER 12 COOKIES AND SESSIONS. INTRO HTTP is a stateless technology Each page rendered by a browser is unrelated to other pages – even if they are from.
Prevent Cross-Site Scripting (XSS) attack
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
Tutorial 10 Adding Spry Elements and Database Functionality Dreamweaver CS3 Tutorial 101.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
JavaScript, Fourth Edition
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
IT security By Tilly Gerlack.
Getting Started with:. Registering for Pearson MasteringNutrition is easy! Go to the home page to get started
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Region 5 Portal Registration Guide 1 Portal Registration: A Quick Start Guide 12/31/08 Aum Sri Sai Ram Sathya Sai Baba Centers of North Central Region.
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
RM Monitor and RMAlerts Installation, Setup, and Requirements January 23, 2010 John Raffenbeul presented this live via an internet connection. These slides.
BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park.
Chapter 16 The World Wide Web. FIGURE 16.0.F01: A very, very simple Web page. Courtesy of Dr. Richard Smith.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
CIS 451: Cookies Dr. Ralph D. Westfall February, 2009.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
AJAX Use Cases for WSRP Subbu Allamaraju BEA Systems Inc WSRP F2F Meeting, May 2006.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
COOKIES AND SESSIONS.
LOGIN FORMS.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
Tonga Institute of Higher Education IT 141: Information Systems
Cross-Site Forgery
The Application Lifecycle
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Active Man in the Middle Attacks
Exploring DOM-Based Cross Site Attacks
Cross Site Request Forgery (CSRF)
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP SSSL: Server Side Secure Login Utility to Phish-Protect your Website Ronen Margulis (joint work with Prof. Amir Herzberg) Bar Ilan University 6 Sep 2009

OWASP 2 SSSL: Agenda  Intro – Phishing risks in spite of SSL  Current Defense Mechanisms & Experiments  SSSL Motivation & Demo  SSSL Details & Risk analysis

OWASP 3 Phishing Risks  Phishing: stealing user’s credentials (password)  Typically by:  Send (spoofed) to user  User clicks on link in , reaches spoofed site  User enters password…  Common Attacks:  Wrong URL attacks  Homographic: submitweb.com vs. submitvveb.com  Misleading: submitweb.c6.com vs. c6.submitweb.com  Correct URL attacks  MITM, e.g. via WiFi  DNS Poisoning (Pharming), e.g Kaminski’s attack

OWASP 4 Phishing – How to Prevent?  Detect, block phishing  Detect, block phishing site (blacklists)  Many phishing sites are short lived  blacklists might not help  Prevent exposure of password to spoofed site  But doesn’t SSL already do this??

OWASP 5 Phishing Attacks in spite of SSL  Wrong URL with no SSL  vs.  SSL, wrong URL with a valid certificate  vs.  SSL, corrupted certificate  SSL, valid certificate published by Phisher’s CA  Browser will ask user… will user approve? Notice?  Experiments: Users do not notice!!

OWASP 6 SSSL: Agenda  Intro – Phishing risks in spite of SSL  Current Defense Mechanisms & Experiments  SSSL Motivation & Demo  SSSL Details & Risk analysis

OWASP 7 Current Defense Mechanisms – Browser  None (‘classical’ browser indicator only)  Display name of site & CA (from certificate)  Display user-selected text for site

OWASP 8 Current Defense Mechanisms – Site  Site Identificator  text  image  Selected during registration to site  Can be passive/interactive  Advantage: User (probably) won’t submit password if identificator doesn’t exist  Disadvantage: One extra click for interactive  Login bookmark – Presented by Ben Adida  User must click on bookmark to login  Advantage: Wrong-URL, no-SSL attacks irrelevant  Disadvantage: The Bookmark…

OWASP 9

10

OWASP 11

OWASP 12 Login Bookmarks – details  Server generates special bookmark per user  User ‘drags’ bookmark into browser  Or automatically installs using javascript  To login, user must click on bookmark  Bookmark contains token for 1st authentication  User enters password  Password used for 2nd authentication  Only If both authenticators are correct the user logs in

OWASP 13 Setting up the Bookmark  Registration process similar to other sites  Confirmation sent to the user contains a link to a bookmark creation page  will add the bookmark with a secret token  The secret token is always sent via a secondary channel other then the web! (SMS is also possible instead of )

OWASP 14 SubmitWeb: Realistic Phishing Experiment [Dvorkin+Herzberg]  The Framework  Real-use assignment submission system  Long period repetitive web and activities  Very few ‘attacks’  Student population: ~500  The Experiments  Each student randomly assigned a defense mech.  Randomly (and very rarely) attacked  The system measured detection rates  Bookmark testings focused on response to

OWASP 15 SubmitWeb: Detection Rates for Identificators

OWASP 16 Submitweb: Login Bookmark Results  (only) 59 phishing s with links were sent  15 to bookmark users, 44 to other users  Bookmark reduced following links, success:  Login bookmark mechanism increases user awareness against phishing attacks PopulationMails sent Links followed % followed% spoof success Bookmark users15213±14%7±10% Other users441534±11%18±9% All users591728±9%15±7%

OWASP 17 SSSL (Server Side Secure Login)  A site-based solution to protect the site’s users  Combines Login Bookmark & Interactive Image  Doesn’t rely on browser Add-ons  Since we can’t control their deployment  Simple, elegant and secure  Easy to deploy on different websites

OWASP 18 SSSL: Agenda  Intro – Phishing risks in spite of SSL  Current Defense Mechanisms & Experiments  SSSL Motivation & Demo  SSSL Details & Risk analysis

OWASP 19 SSSL Motivation  Easy Integrated & Free toolkit  Why not use just interactive custom image?  Detection rates are still ~80-90%  Why not use just login bookmark?  users might follow links to spoofed sites and submit their password  secret token remains secret, but..  password itself is critical

OWASP 20 SSSL Motivation – continue  Interactive custom image and login bookmark complete each other  Bookmark prevents surfing to a spoofed site  Custom image helps identifying a spoofed site  Each protect a different secret  Bookmark protects the token  Custom image protects the password  According to experiments – each are likely to succeed  All of the above suggest SSSL’s defense is strong!

OWASP 21 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password

OWASP 22

OWASP 23

OWASP 24

OWASP 25

OWASP 26

OWASP 27

OWASP 28

OWASP 29

OWASP 30

OWASP 31

OWASP 32

OWASP 33

OWASP 34 Usability Issues – Users  Bookmarks are easy to install in any browser  To all users?  Can be synchronized in several browsers and/or computers  Is this option common? Does users know this option?  Are not likely to be deleted, unlike cookies  Need bookmark for each site protected by SSSL

OWASP 35 Usability Issues – Users  Annoying to click the bookmark and image?  Less typing to do – bookmark contains username  Details later  Keeping registration helps bookmark creation on multiple computers  If Alice looses the – the website can send it again after asking her some identification questions

OWASP 36 Usability Issues – Site Admins  SSSL is a Free Utility  Easy to Read and Deploy in short time  Small amount of Code  ~100 lines of PHP (5.2.8) code as the backend  ~200 lines of Wrapping HTML code (for the demo)  ~100 lines of Javascript code + an hmac library implementation  Site Admins are encouraged to integrate SSSL  Suggestions for improvements are welcome

OWASP 37 SSSL: Agenda  Intro – Phishing risks in spite of SSL  Current Defense Mechanisms & Experiments  SSSL (Server Side Secure Login) – and enhancement to SSL  SSSL Details & Risk analysis

OWASP 38 How can the secret token be stored and sent over the network  In a cookie  In a GET parameter  In the Fragment Identifier  used to designate portion of page  browser scrolls to the appropriate location – if exists  changing fragments does not cause page reload  used in slide presentations, page scrolling without reload  never sent to the server but accessible from JavaScript

OWASP 39 How can the secret token be stored and sent over the network – continue  The secret token has to be stored in the browser and be sent over the network in the most secure way  Where can the token leak from?  MITM  Cookies  Token in the bookmark, as part of the URL  The address bar  The browser’s history  The HTTP Referrer Header  Cache Proxies/Web Server Logs  Assumption: use SSL  Automatically terminates MITM and the Referrer header threats

OWASP 40 Designing how the secret token should be stored and sent over the network Leakage ThreatsMethod MITM, XSS, shoulder surfing, history, Referrer Header, Caches/Logs Cookies over SSL MITM, XSS, shoulder surfing, history, Referrer Header, Caches/Logs GET parameter over SSL MITM, XSS, shoulder surfing, history, Referrer Header, Caches/Logs Fragment Identifier over SSL

OWASP 41 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password

OWASP 42 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password 1.Javascript deletes the fragment identifier from the address bar and history and stores it in a variable 2.Fills in the username in the login page 3.The page doesn’t reload

OWASP 43 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password hmac token (username)

OWASP 44 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password

OWASP 45 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password Javascript displays hidden password text field

OWASP 46 The SSSL Protocol AliceBrowsermysite.com types mysite.com GET /login.php You Should login via your bookmark clicks bookmark secret token login.php + custom image You Should login via your bookmark clicks image enables password submission submits password password hmac token (username|password)

OWASP 47 User Awareness to Custom Image  Users might click any image presented to them  Can show the user a (small) set of images (~3-5) along with the custom image  user must click his correct custom image from the set of images  May improve user awareness  Use moving (‘animation’) gif images to increase awareness

OWASP 48 Resistance to Specific Attacks  Spoofed site  user follows link but token remains secret  user sees no custom image  password remains secret  Replace bookmark  replacing the bookmark does not reveal token  user sees no custom image  password remains secret  Spoofing the Browser Interface  Opening a new window with a fake bookmarks bar containing a fake bookmark  Fake bookmarks bar does not reveal token  user sees no custom image  password remains secret

OWASP 49 Resistance to Specific Attacks (cont.)  Overriding Page Unload  window.onuload = function(){ window.location = ‘ }  token remains secret since window.location yields current site  Alice doesn’t see her username automatically filled in, and doesn’t see her custom image  password remains secret

OWASP 50 Resistance to Specific Attacks (cont.)  Explicit bookmark theft  With unload overriding an attacker can convince Alice of a technical problem and ask for her bookmark  Alice needs to “make an effort” and manually copy it from the properties of the bookmark  Fragment identifier is shown in the address bar for a few milliseconds only  token, password exposed  Site should educate users to never give away the bookmark data, esp. when the custom image isn’t presented

OWASP 51 Resistance to Specific Attacks (cont.)  Attacking account  Exposes token  Password to the account might be the website’s password  If not, attacker retrieves the image  Then perform a phishing attack to retrieve the password  Using the victim’s computer  Token and image exposed, password OK  Attacker needs to perform a phishing attack to retrieve the password  Malware on victim’s computer  Bookmarks (and thus token) are exposed  Password can be key-logged

OWASP 52 Resistance to Specific Attacks (cont.)  Pharming Attack (correct URL, redirection to spoofed site)  no SSL - won’t work  SSL, spoofed site has corrupted certificate (or from a phisher’s CA) and the user doesn’t notice the browser warning:  hmac token (username|password) exposed to attacker  MITM can replace script and read token, password themselves

OWASP 53 SSSL Limitations  Javascript required  Sometimes disabled by users for security  Site can ask user to enable javascript or allow him to connect with a different mechanism (like interactive image only)  Vulnerable to Pharming attacks with bad certificate and Malware

OWASP 54 Conclusions  SSL in not enough  use SSSL !!  SSSL is a simple and elegant solution to defend website’s users from phishing  combines a login bookmark and an interactive custom image to improve security  Can be tried at:  Source code can be downloaded at:

OWASP 55 Future Plans  Running a pilot of an SSSL-protected website  More experiments  More data, more confidence  Compare detection rates between the following groups:  SSSL users  Bookmark Login Users  Interactive Custom Image users  Control group users (no indicators)  Design and implement a (secure) method for password recovery for SSSL-protected sites

OWASP 56 Thank You!! Questions/suggestions are welcome: