Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure Paper By : V.T.Lam, S.Antonatos, P.Akritidis, K.G.Anagnostakis Conference : ACM.

Slides:



Advertisements
Similar presentations
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Advertisements

Web Security Model CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Introduction to Web Based Application. Web-based application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
1 The World Wide Web Architectural Overview Static Web Documents Dynamic Web Documents HTTP – The HyperText Transfer Protocol Performance Enhancements.
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure Lam Vin The, Spiros Antonatos and Kostas G. Anagnostakis Adapted by Gary Bramwell.
Web server security Dr Jim Briggs WEBP security1.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
 What I hate about you things people often do that hurt their Web site’s chances with search engines.
Subspace: Secure Cross-Domain Communication for Web Mashups Collin Jackson Stanford University Helen J. Wang Microsoft Research ACM WWW, May, 2007 Presenter:
Subspace: Secure Cross-Domain Communication for Web Mashups In Proceedings of the 16th International World Wide Web Conference. (WWW), 2007 Collin Jackson,
FORESEC Academy FORESEC Academy Security Essentials (II)
1 CS 3870/CS 5870 Static and Dynamic Web Pages ASP.NET and IIS.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
Prevent Cross-Site Scripting (XSS) attack
Dynamic Web Pages (Flash, JavaScript)
HTML Forms and Scripts. Session overview What are forms? Static vs dynamic Client-side scripts –JavaScript.
1 CS 3870/CS 5870 Static and Dynamic Web Pages ASP.NET and IIS.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Introduction to Internet Programming (Web Based Application)
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Final Introduction ---- Web Security, DDoS, others
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Security+ Guide to Network Security Fundamentals, Fourth Edition
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
WEB SCIENCE. What is the difference between the Internet and the World Wide Web? Internet is the entire network of connected computers and routers used.
1 Welcome to CSC 301 Web Programming Charles Frank.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Web Design (1) Terminology. Coding ‘languages’ (1) HTML - Hypertext Markup Language - describes the content of a web page CSS - Cascading Style Sheets.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
An Intro to Webhackery Parisa Tabriz. How the web was born Stage 1 : Network Protocols Stage 2 : HTTP Stage 3 : Server Side Scripting Stage 4 : Client.
Protecting Browsers from DNS Rebinding Attacks Collin Jackson, Adam Barth, Andrew Bortz ACM CCS Systems Modeling & Simulation Lab. Kim.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Module 7: Advanced Application and Web Filtering.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Chapter 16 The World Wide Web. FIGURE 16.0.F01: A very, very simple Web page. Courtesy of Dr. Richard Smith.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Web application architecture1 Based on Jim Conallen: Web Applications with UML.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Safe browsing - is an ad-blocker extension enough? AIMILIOS TSOUVELEKAKIS IT-DI-CSO IT LIGHTNING TALK – 12/
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
 AJAX technology  Rich User Experience  Characteristics  Real live examples  JavaScript and AJAX  Web application workflow model – synchronous vs.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
4.01 How Web Pages Work.
CX Introduction to Web Programming
TMG Client Protection 6NPS – Session 7.
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
World Wide Web policy.
Cross-Site Request Forgeries: Exploitation and Prevention
4.01 How Web Pages Work.
Cross Site Request Forgery (CSRF)
Presentation transcript:

Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure Paper By : V.T.Lam, S.Antonatos, P.Akritidis, K.G.Anagnostakis Conference : ACM Conference on Computer and Communications Security 2006 Presented By : Ramanarayanan Ramani

Scenario Attacker 1.Compromise 2.Embed Malicious Code in Webpage 3.Clients Access Webpage and execute malicious code Clients are the Puppets – they can be controlled till they have the webpage open in the browser.

Puppetnet vs Botnet  Not heavily dependent on the exploitation of specific implementation flaws  The attacker does not have complete control over the actions of the participating nodes  Participation in puppetnets is more dynamic

Overview  Attack Scenarios using Puppetnet  Analysis of attack scenarios  Defense against Puppetnets  Paper Review  Suggestions

DDoS (Distributed Denial of Service)

DDoS  Sample Code : setTimeout(pingVictim,1000); Function pingVictim() { var image1 = getElementById(‘img1’); image1.src = “ setTimeout(pingVictim,1000); }

Worm Propagation

 Embed Worm Code in the Webpage  Perform scanning and try to propagate the worm code  If outbound from server blocked – it can propagate using webpage  Client behind NAT/Firewall can propagate in the secure network

Reconnaissance probes

 Problem : Browsers refuse access to the contents of an inline frame, unless the source of the frame is in the same domain with the parent page  “Sandwich” the probe request between two requests to the malicious Web site Use onLoad,onError event handlers to sandwich request

Protocols other than HTTP  Limitation of Puppetnets : Bound to use HTTP as part of browser Solution :  Tunnel SMTP/IRC/FTP..  Protocol messages wrapped around the HTTP message GET /index.html HTTP/1.1 Host: HELO mydomain.com … (For SMTP)

Exploiting cookie authenticated services Constraints :  The inline frame needs to be able to post cookies; this works on Firefox, but not IE  Have knowledge about the structure and content of the form to be posted, as well as the target URL  Able to instruct browsers to automatically post such forms (Supported by all browsers)

Distributed malicious computations  Can be done through Javascript, Active-X or Java applets  ActiveX : Produces ‘Accept’ or ‘Deny’ box  Applets : Instantiate JVM – but can be placed in hidden frames  Script : Slower but can be hidden  Example : MD5 computation  Javascript : 380 checksums/sec  Applet : 434K checksums/sec  1,000-node puppetnet can crack an MD5 hash as fast as a 128-node cluster

Analysis - DDoS

Two types of attacks: A simple attack aiming to maximize SYN packets (maxSYN) One aiming to maximize the ingress bandwidth consumed (maxURL)

Analysis - DDoS * Estimate for a 1000-node puppetnet

Analysis – Worm Propagation CodeRed Worm CodeRed attacks IIS server (Web Server) A vulnerable population of 360,000 and a server scanning rate of 358 scans/min Browsers performing 36 scans/min

Analysis – Worm Propagation CodeRed Worm

Analysis - Reconnaissance probes

Defense  Disabling Javascript  Careful implementation of existing defenses  Filtering using attack signatures  Client-side behavioral controls  Server-side controls and puppetnet tracing  Server-directed client-side controls

Advantages  Simple and very effective to attack  Light-weight compared to botnet  Uses HTTP which makes detection difficult

Disadvantages  No complete control over client  Tough to compromise web servers (not explained how to do it in the paper)  View Source Command on HTML page will reveal puppetnet code

Suggestions  Look into hiding code using encoding or embed code into objects like Flash  Use puppetnet to create botnet in the client machine  Provide ideas to compromise the web server

?Questions?