1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21...

26
Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten, Jennifer Hadley & Steven Lovaas

Transcript of 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21...

Page 1: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

1 Copyright © 2014 M. E. Kabay. All rights reserved.

Web-Based Vulnerabilities

CSH6 Chapter 21“Web-Based Vulnerabilities”

Anup K. Ghosh, Kurt Baumgarten, Jennifer Hadley & Steven Lovaas

Page 2: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

2 Copyright © 2014 M. E. Kabay. All rights reserved.

Topics

Breaking E-Commerce Systems Case Study of Breaking an E-Business Web Application System Security Protecting Web Applications Components & Vulnerabilities in E-Commerce Systems

Page 3: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

3 Copyright © 2014 M. E. Kabay. All rights reserved.

Breaking E-Commerce SystemsThinking about how criminal hackers think

Attack weakest linkLook for monetary gainLow-hanging fruitAttack servers when possible

Must harden not only perimeter but also coreAsymmetric attacks

Defense harder & more costly than offenseScript kiddies have caused $M damage

E.g., MafiaBoy 2000 vs eBay, Amazon, Schwab….

Page 4: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

4 Copyright © 2014 M. E. Kabay. All rights reserved.

Case Study of Breaking an E-Business (1)

Page 5: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

5 Copyright © 2014 M. E. Kabay. All rights reserved.

Case Study of Breaking an E-Business (2)

Page 6: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

6 Copyright © 2014 M. E. Kabay. All rights reserved.

Web Application System SecurityAbsolutely require corporate security policy

Informs decisions on specific security configurations

Inconsistencies can doom securitySecurity systems should be independently

evaluatedSystem audits (do measures conform with

policy?)Vulnerability analysis (can we locate

obvious gaps in security?)Penetration testing (can we break through

the barriers using criminal hacker methods?)

Page 7: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

7 Copyright © 2014 M. E. Kabay. All rights reserved.

Protecting Web ApplicationsLayered view of systemsNetwork, OS flaws usually documented

AlertsNational Vulnerability

Database http://nvd.nist.gov/

Vulnerability scannersavailable (see CSH6 Ch 46)

Firewalls critical elementApplication servers (Java etc) must be securedApplication security = function of how programs

are configured & used (not just of patches)

Page 8: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

8 Copyright © 2014 M. E. Kabay. All rights reserved.

Components & Vulnerabilities in E-Commerce Systems

Client-Side RisksNetwork Protocol RisksBusiness Application LogicCGI Script VulnerabilitiesApplication SubversionWeb Server ExploitsDatabase SecurityPlatform Security

Page 9: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

9 Copyright © 2014 M. E. Kabay. All rights reserved.

Client-Side Risks

Most e-commerce uses browsersAlso extending to hand-held devices

Threats from malicious mobile code (CSH6 Ch 16 & 17); e.g., Web scripts, Java applets, ActiveX controls, Trojan horse programs

Serious risk from loss of privacyIdentity theft against data subjectsBusiness & legal consequences for

corporate victimsBrowsers typically convey much private

infoSpyware tracks computer usage

Page 10: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

10 Copyright © 2014 M. E. Kabay. All rights reserved.

Network Protocol Risks

Primarily result from sending unencrypted data over the ‘Net

Several protocols preserve confidentiality by using encryptionSET (Secure Electronic Transaction)SSL (Secure Sockets Layer)S/HTTP (Secure HTTP)(superseded)S/MIME (Secure Multipurpose Internet Mail

Extensions)CyberCash (proprietary credit-card system)

(bankrupt 2001, bought by VeriSign & First Data Merchant Services Corp.)

See CSH6 Ch 30

Page 11: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

11 Copyright © 2014 M. E. Kabay. All rights reserved.

Network Protocol Attacks

Man-in-the-middle (intercepting, inserting)DNS attacks (altering tables to misdirect users)War dialing (scanning all phone numbers in block

for modems)Exploiting software holes (FTP, Bind, SMTP,

HTTP) Internal access (unauthorized behavior by

authorized personnel)Leveraging trusted hosts (attack from linked

system)Brute-force decryption (test all possible keys)

Page 12: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

12 Copyright © 2014 M. E. Kabay. All rights reserved.

Business Application Logic Key area of vulnerability

Usually custom SWComplexMay not be tested as

thoroughly as COTS Critical elements include

Common Gateway Interface (CGI)

Hypertext Processor (PHP)Component-based software (CBS)

Enterprise JavaBeans (EJB)Java 2 Enterprise Edition (J2EE)Common Object Request Broker Architecture

(CORBA)Common Object Model (COM & DCOM)

Page 13: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

13 Copyright © 2014 M. E. Kabay. All rights reserved.

CGI Script VulnerabilitiesFrequent object of attack Inputs not under control of programmerMisconfiguration common problem

Individuals can add CGI to Web pagesCan go out of control – introduce holesBest to limit execution of CGI to central

directory under control of adminProtect cgi-script directories (cgi-bin)Languages create weaknesses

Perl, JavaScript, PythonDon’t include Perl interpreter in cgi-bin

Could allow unauthorized execution of commands

Page 14: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

14 Copyright © 2014 M. E. Kabay. All rights reserved.

Application Subversion

Program misuseExploit program logic

Raise user privilegesGain unauthorized data access

Attacker may discover unauthorized ways of using system

Send malformed input including commandsRedirect program outputBeware of amateursApply strict software quality assurance to

production code

Page 15: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

15 Copyright © 2014 M. E. Kabay. All rights reserved.

Web Server ExploitsConfiguration

Default = max function, min securityHTML Coding & Server-Side Includes

Disallow SSI to prevent insertion of unauthorized commands

Private Documents in Public DirectoriesDisallow directory browsing

Cookies & Other Client-Side RisksUsers can alter cookies created by Web siteCookie poisoning can exploit authentication

tokensE.g., alteration of discount codes → losses

Page 16: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

16 Copyright © 2014 M. E. Kabay. All rights reserved.

Database Security

Web interfaces too often added to formerly closed systems without proper analysis

Most users do not encrypt their databasesBuffer-overflow attacks can grant root access

to intruderSome programmers hard-code passwords

into programs (!!) NO NO NO!Default DB settings often weakAudit DB log files for anomalies

Page 17: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

17 Copyright © 2014 M. E. Kabay. All rights reserved.

Platform Security

Operating system security essentialSee CSH6 Ch 24Must not count solely on perimeter security

Harden OS configuration to resist attack even if perimeter is breached

Maintain up-to-date patches (see CSH6 Ch 40)Vulnerability assessmentsPenetration testing

Page 18: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

18 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)Anti-Phishing

Working Group (APWG)http://apwg.org/

APWG Phishing Attack Trends Reports

Started 2004-01Valuable resources

for term paper!

https://apwg.org/resources/apwg-reports/

Page 19: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

19 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 20: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

20 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 21: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

21 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 22: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

22 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 23: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

23 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 24: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

24 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 25: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

25 Copyright © 2014 M. E. Kabay. All rights reserved.

APWG Phishing Activity Trends (2014)

Page 26: 1 Copyright © 2014 M. E. Kabay. All rights reserved. Web-Based Vulnerabilities CSH6 Chapter 21 “Web-Based Vulnerabilities” Anup K. Ghosh, Kurt Baumgarten,

26 Copyright © 2014 M. E. Kabay. All rights reserved.

DISCUSSION