ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a...

36
ACM Conference on Computer and Communic ations Security 2006 Puppetnet: Misusing web browsers as a d istributed attack infrastructure Network Seminar Presenter: Chen Chih-Ming

description

3 Term Puppetnet code Infected Server Puppet client Victim

Transcript of ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a...

Page 1: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

ACM Conference on Computer and Communications Security 2006

Puppetnet: Misusing web browsers as a distributed attack infrastructure

Network SeminarPresenter: Chen Chih-Ming

Page 2: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

2

Outline

IntroductionTermDesign and AnalysisDefensesRelated workConcluding remarks

Page 3: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

3

Term

Puppetnet code Infected ServerPuppet clientVictim

Page 4: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

4

Introduction

To coerce web browsers to participate in malicious activities

Not heavily dependent on the exploitation of specific flaws

Not control over participating nodes completely

Dynamic, short live target Indirect attack

Page 5: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

5

Design and Analysis

DDoSWorm propagationReconnaissance probesProtocol other than HTTPExploiting cookie-authenticatedDistributed malicious computation

s

Page 6: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

6

DDoS

Hidden frameJavaScript loopEmbed objectCache

Add GETConnect limit of browser

Use different host name

Page 7: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

7

Page 8: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

8

Page 9: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

9

Page 10: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

10

Page 11: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

11

Page 12: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

12

Worm propagation

Code RedAttack IIS server

Infecting processServerViewerVictim

Page 13: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

13

Page 14: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

14

Page 15: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

15

Page 16: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

16

Page 17: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

17

Reconnaissance probes

Timing attack

Page 18: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

18

Page 19: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

19

Page 20: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

20

Page 21: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

21

Protocol other than HTTP

SMTP IRC

Trigging botnet

Page 22: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

22

Exploiting cookie-authenticated

Web mailSend victim’s mail to attacker

Page 23: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

23

Distributed malicious computations

JavaScript or AppletCrack password

Page 24: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

24

Defenses

Disabling JavaScriptCareful implementation of existing

defensesFiltering using attack signaturesClient-side behavioral controlsServer-side controls and puppetnet

tracingServer-directed client-side controls

Page 25: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

25

Disabling JavaScript

Most sites employ JavaScriptJust enable trusted siteReduce one order magnitude, but

not eliminateNot attractive

Page 26: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

26

Careful implementation of existing defenses

Connection rate limiterReduce one order magnitude, but

not eliminateStill insufficient

Page 27: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

27

Filtering using attack signatures

For spam is okDDoS is hard to makeNot like string matchingNeed additional HTML parserObfuscation of HTMLToo complex

Page 28: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

28

Client-side behavioral controls

DDoSImpose controls on foreign request fr

om a web pageAffect web viewing, not good enough

WormImpose limiting amount of objects fro

m different siteCan evading by dns

Page 29: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

29

Page 30: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

30

Page 31: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

31

Server-side controls and puppetnet tracing

Block referrer, but still waste bandFind referrer to take down

attackingNot effective

Page 32: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

32

Server-directed client-side controls

Embed access control token in headerRestrict requests per session

Need public key to verifyModify server & client

Page 33: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

33

Page 34: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

34

Related work

Web securityXSSX-flash attack, like puppetnets

Page 35: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

35

Concluding remark

New class of web-based attackNone of the strategies were

complete satisfyingOnly partial solution

Page 36: ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:

36

End

Bye~