POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Akshat Sharma Samarth Shah
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
Network Attacks Mark Shtern.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Web Communication Client attempts to “pull” information from server – http message sent across Internet by TCP/IP* – packet switching used to route message.
1 Caching in HTTP Representation and Management of Data on the Internet.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Web server security Dr Jim Briggs WEBP security1.
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
FTP (File Transfer Protocol) & Telnet
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Computer Emergency Notification System (CENS)
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Http protocol Response-request Clients not limited to web browsers. Anything that can access code implementing the protocol works: –Standalone programs.
CHAPTER 9 Sniffing.
CIS679: Lecture 13 r Review of Last Lecture r More on HTTP.
The Intranet.
Data Acquisition in a PACS Weina Ma Sep 24 th, 2013.
Information Security in Distributed Systems Distributed Systems1.
Network Security Introduction
Chapter 7 – Confidentiality Using Symmetric Encryption.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Example security systems n Kerberos n Secure shell.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
What’s Really Happening
Web and Proxy Server.
BUILD SECURE PRODUCTS AND SERVICES
Virtual Private Networks
SFS-HTTP: Securing the Web with Self-Certifying URLs
Module 3: Enabling Access to Internet Resources
The Hypertext Transfer Protocol
Securing the Network Perimeter with ISA 2004
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Radius, LDAP, Radius used in Authenticating Users
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
Web Caching? Web Caching:.
Information and Network Security
6.6 Firewalls Packet Filter (=filtering router)
IIS.
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
NetChat Communications Framework
Information Retrieval and Web Design
Presentation transcript:

POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture and modify HTTP traffic between a client and server on a closed network. It is assumed that HTTP is the only protocol in use and there are no other security measures currently implemented on the web server. Test Method: Capture client HTTP traffic via a proxy server on a LAN and attempt to read, edit, and forward the HTTP messages to the web server. Once the edited message has been received by the server, it will serve a resource that was not originally requested by the client. Conclusions: HTTP traffic was able to be captured and modified on all four web servers on each operating system. There is no mechanism for obfuscating HTTP traffic in any of the servers tested when exclusively using the HTTP protocol. Caching Project Summary Identify web servers more vulnerable to attack due to their implementation of recent changes to the HTTP protocol. The project team focused on five areas of HTTP to find scenarios in which servers are not secure. Range Requests Use the Range header to request byte ranges that overlap and are out of order with the goal of denying service to legitimate clients. Serving the resource in many parts uses much more time, memory, and bandwidth than a normal Range request. Test Method: Send HTTP requests with a ‘Range’ header requesting several overlapping and out of order byte ranges. Conclusions: IIS, Tomcat, and NGINX each served overlapping and out of order byte ranges, requiring much more data to be served. Apache, however, would aggregate the byte ranges, so no overlapping or out of order byte ranges would be served. The size of the served resource was significantly smaller than the resource served by the other three web servers. Authentication Semantics & Content Attempt to obtain confidential authentication credentials sent from a client requesting a resource that is within a protection realm on the HTTP server. Test Method: Capture client traffic via a proxy server and attempt to use the clients credentials to gain access to protected resources on the web server. Conclusions: All four web servers used a base-64 encoding to receive the authentication request. The IIS server performed differently in that it decoded the base-64 into a Windows-1252 charset instead of UTF-8. By intercepting the interaction between the client and the server, it is possible to intercept the encoded credentials, decode them, and use them to access protected resources. Although encoding is not encryption, it provides some method of obfuscation of the authentication credentials. Attempt to obtain product information through HTTP headers that disclose information about the sender’s system. Attackers may be able to use this data to more effectively attack the system. Testing Method: Capture HTTP requests between the server and client and try to obtain operating system and server data from the “Server” header. Conclusions: NGINX, Apache, and IIS responded with the name of the server, the version number, and the operating system on which the server was running. Only Tomcat sent a “Server” header that did not contain the operating system on the host machine. Attempt to obtain user authentication credential data from a server side cache via HTTP. Test Method: Send HTTP requests with the intent of obtaining data in the webserver authentication cache. Conclusions: Using strictly HTTP, none of the web servers would serve data from their authentication cache. Each server had a different method of caching authentication credentials, but none could be accessed via HTTP alone. Servers Tested: Operating Systems: Testing Tools: Security Rating Key Signifies some server functionality that mitigates vulnerabilities relating to a specific area of the HTTP protocol. - Signifies vulnerabilities that can be exploited by HTTP messages implementing the new functionality.