DOC PREVIEW
NU MSIT 458 - Web Based Attacks

This preview shows page 1-2-21-22 out of 22 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Web Based Attacks Symantec White Paper Offense – The Other SideGeneral Impression on WhitepaperItems MissedWeb 2.0 VulnerabilitiesWebmail ThreatsOnline Video as a VectorSocial NetworkingSlide 8The KoobfaceThe Mikeyy Mooney WormsSlide 11Search Engine Optimization (SEO)‘Black-hat’ SEO‘Black-hat’ SEO Cont’dSlide 15Countries hosting Malicious WebsitesGlobal CybercrimePartnerkaTop SpammersPartnerka cont’dSlide 21ReferencesWeb Based AttacksSymantec White PaperOffense – The Other SideByAC2Craig, RB, Henky, SohailGeneral Impression on Whitepaper•Overall the white paper was informative•Does not clearly define audience–For sophisticated users: too introductory–For novice users: lack of practical guidelines (ex: comparison of various products such as Symantec vs freeware AVG)•Somewhat outdated – rapidly changing threatsItems Missed–Other vectors:•Web 2.0 vulnerabilities•Webmail threats•Social media sites (ex: Facebook, Twitter, etc)•Online video sites (ex: Youtube, adult video sites, etc)•“Black-hat” Search Engine Optimization (SEO)–Global Economics of cybercrimeWeb 2.0 Vulnerabilities•Cross Site Scripting (XSS)- Malicious input is sent by an attacker, stored by a system, and then displayed to other users. •CSRF/ CGRF- Malicious site code generates requests to a different site to which the victim is authorized, for example through a persistent cookie•Phishing- Installs a fraudulent widget or redirects to a fraudulent website to steal sensitive information from the victim•Injection Flaws- XML injection, XPath injection, JavaScript injection and JSON injectionWebmail Threats•Increasing SPAM and Unsolicited E-mail –Resurge of SPAM mails during the Obama presidency campaign (2008)–Malware that disguised as invoices from Fed-Ex and UPS (2009)–Online Pharmacy scam (2009)•Webmail Service–10 K of accounts were leaked on Oct 09, for Hotmail, Gmail, Yahoo and other popular Webmail sites•Content and Virus filtering outside perimeter–Cloud based filtering to secure E-mail and corporate networkOnline Video as a Vector•We have entered into the “You Tube” age where anyone can upload a video.–Online web links trick victims in loading a program “stream viewer” to watch the movie–This is actually a malware programSocial Networking•In 2009 about 2% of all online clicks going thru 4000 Cisco security devices were for Social networking sites.•Facebook was the winner with 1.35% of all online clicks.•So who posses the most online security risk•Business cannot ignore these threats anymore (my company blocked facebook access)Social Networking Perceived ThreatThe Koobface•It’s a sophisticated worm which registers and activates facebok accounts•Sends invitation to random facebook users•Joins random groups , and post messages on friends wall (which includes link to videos which have malware)•And it is SMART it protects itself from detection by not making too many new friends.The Mikeyy Mooney Worms•Twitter in April 2009 got attacked by the StalkDaily Worm•This was a work of a 17 year old called Mikeyy Mooney. (Who did this because he was bored)•The worm basically posts unwanted messages to users pages•In December 2009, the Twitter DNS was compromised and visitors were redirected to a site hacked by the Iranian Cyber ArmySAMMY (XSS)(a.k.a JS.Spacehero)•On Oct 4, 2005 The first major worm to use cross-site scripting (XSS) vulnerability•Over One million personal users profile were altered overnight•MySpace at that time had over 32 million users and was among the top 10 visited site in the US•Using JavaScript viral code the worm infected the site and made the hacker – Sammy a “friend” and a “Hero” on the infected users profile•The worm displayed a string something like “but most of all, Sammy is my hero”Search Engine Optimization (SEO)•Standard marketing technique used by many legitimate firms to promote internet presence•Involves: –careful selection of keywords and topics–Manipulation of links to increase a page’s popularity•Attract visitors with SEO to push links to the top of search results‘Black-hat’ SEO•‘White-hat’ SEO: approved methods by search vendors: editing content to increase relevance to certain search keywords•‘Black-hat’ SEO: spamdexing, ‘doorway’ pages, spam messages posted on blogs/forums.‘Black-hat’ SEO Cont’d•Most popular: ‘doorway’ sites –hosting content specifically created/optimized for a particular topic & search phrases–Link to a promoted site using URL containing affiliate ID–High density of related keywords  when indexed by search engine, referred site by ‘doorway’ will rank higher & placed higher in search results •Common ‘black-hat’ SEO workflow:–Mining Google Trends data for most popular search topics (ex: ‘death of david carradine’, ‘lady gaga’, etc)–Generating content related to popular search phrases & linking to a promotional site–Uploading content as a blog, forum post, Wiki article, or as a site•Most of the steps automated by SEO software tools‘Black-hat’ SEO Cont’d•Custom tools for sale on underground black-hat forums to generate contents that seems genuine & interlink pages across domains for more exposure–A-Poster: specializing in spamming guestbooks–Xrumer: discussion forums – automated forum registrations, generate email accounts–ZennoPoster: •generate accounts on any webmail site, social networks, blogs, free web-hosting provides, etc•Send SMS messages•Parse search results•Place spam on forums and guestbooksCountries hosting Malicious Websites•US is #1 (Top 3 in 2009: US, Russia, China)•China’s figure dropped from 51.4% (2007) to 27.7% (2008), to 11.2% (2009)•Peru moving strongly up to 4th in 200920082009Global Cybercrime•Honest money is harder to come by•People being lured into world of crime, programmers who can’t find legit jobs are more easily recruited by criminal gangs•Malware has evolved to become a major industry in itself, with complicated economic infrastructure & population of well-organized, well-funded criminal gangs, highly motivated & highly trained programmers generating massive volumes of malicious codes and exploitsPartnerka•Russian term referring to complex networks of affiliates linked by a common desire to make money from the internet.•Groups are well organized, dominated by Russians, &


View Full Document

NU MSIT 458 - Web Based Attacks

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Web Based Attacks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Web Based Attacks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Web Based Attacks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?