attack chaining for web exploitation

65
Attack chaining for web exploitation --- Abhijeth Dugginapeddi

Upload: nu-the-open-security-community

Post on 14-Apr-2017

798 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Attack chaining for web exploitation

Attack chaining for web exploitation

--- Abhijeth Dugginapeddi

Page 2: Attack chaining for web exploitation

#whoami

Security Analyst at Adobe Systems

Hacking since 14 and gave sessions in most engineering colleges

Like many, found bugs in Google, Facebook, Yahoo, Microsoft and more than 50 sites. Among Top 5 Bug hunters in Synack

A Telugu movie buff and a start up enthusiast

Page 3: Attack chaining for web exploitation

No organization or no company is responsible for whatever I talk for the next 30 minutes!!

Page 4: Attack chaining for web exploitation

Where to start

Page 5: Attack chaining for web exploitation

What to start

Page 6: Attack chaining for web exploitation

How to start

Page 7: Attack chaining for web exploitation

Do you know him!!

Page 8: Attack chaining for web exploitation

Hackers hacked

Page 9: Attack chaining for web exploitation
Page 10: Attack chaining for web exploitation

Called up amazon and add a new credit card to amazon account

Associated emailBilling AddressRandom Credit card number

Now they call again saying they lost the password

NameBilling addressCredit card number

The attackers now got access to his amazon account

Page 11: Attack chaining for web exploitation

Billing addressLast 4 digits of credit card

Page 12: Attack chaining for web exploitation
Page 13: Attack chaining for web exploitation
Page 14: Attack chaining for web exploitation
Page 15: Attack chaining for web exploitation

Chaining of web attacks• Used majorly by Real attackers• Understanding the application code and infrastructure in depth• Using multiple vulnerabilities• Knowledge on various technologies

Impacts• Defacing sites• Denial of service• Deleting code, DBs, user profiles, customer data etc.

Page 16: Attack chaining for web exploitation

The other 42% of vulnerabilities are caused because of weak configurations/administration

Only 58% of vulnerabilities are caused because of weak code

Source: PTSecurity

Page 17: Attack chaining for web exploitation

Vulnerability in Code + Vulnerability in Configuration = Large Impact

Page 18: Attack chaining for web exploitation

Do you think a vulnerability like CSRF or Mixed content in isolation can directly lead to a Security breach?

Page 19: Attack chaining for web exploitation

May not be true.

But a Security Breach is definitely possible if the attacker can chain these attacks

Page 20: Attack chaining for web exploitation

Normal attack

Page 21: Attack chaining for web exploitation

Attack chain

Page 22: Attack chaining for web exploitation

Vulnerabilities reported in a Web Application

Mixed Content Unwanted methods allowed

Cookie Flags missingURL Redirection

Directory traversalWeak Ciphers

Banner Grabbing

Insecure Direct Object Reference

Page 23: Attack chaining for web exploitation

Few stories

Page 24: Attack chaining for web exploitation

This particular Request uses Insecure Transmission which will allow the attacker to sniff the request

Page 25: Attack chaining for web exploitation

Using BurpSuite Decoder, the encoded value is decoded in plain text

Page 26: Attack chaining for web exploitation

Encoded back by adding ‘ ‘or’ ‘1’ =‘1

Page 27: Attack chaining for web exploitation
Page 28: Attack chaining for web exploitation

Mixed Content

Weak Encryption

SQL Injection

Complete credit card details

Page 29: Attack chaining for web exploitation

Targeted attack

Page 30: Attack chaining for web exploitation

Insecure Direct Object Reference

Page 31: Attack chaining for web exploitation

Parameter Tampering

Page 32: Attack chaining for web exploitation

Access control Violation

Page 33: Attack chaining for web exploitation

Cross Site Request Forgery

Page 34: Attack chaining for web exploitation
Page 35: Attack chaining for web exploitation

Insecure Direct Object Reference

Parameter tampering

CSRF

Perform illegal transactions from a victim’s account

Access control violation

Page 36: Attack chaining for web exploitation

Target= AbhijethAbhijeth’s Bank Details

Access to someone’s details

Bruteforce and get Abhijeth’s details

Use this details to make illegal transaction!!

Page 37: Attack chaining for web exploitation

Jo dar gaya samjo mar gaya

Page 38: Attack chaining for web exploitation

Some company’s email Inbox

Page 39: Attack chaining for web exploitation

Upload exe files

Page 40: Attack chaining for web exploitation
Page 41: Attack chaining for web exploitation

#begbounty!!!

Page 42: Attack chaining for web exploitation
Page 43: Attack chaining for web exploitation

Improper CSRF and Access controls

Page 44: Attack chaining for web exploitation

Spread malware using your application!!!

Page 45: Attack chaining for web exploitation

And then!!

Page 46: Attack chaining for web exploitation
Page 47: Attack chaining for web exploitation

Security misconfiguration

Page 48: Attack chaining for web exploitation
Page 49: Attack chaining for web exploitation

PUT /foo

Page 50: Attack chaining for web exploitation

Cross Site Scripting

Page 51: Attack chaining for web exploitation

Malicious file upload

Page 52: Attack chaining for web exploitation

But no SHELL

Page 53: Attack chaining for web exploitation

Privilege Escalation

Page 54: Attack chaining for web exploitation

Aise the bhayya bajrangi!!

Page 55: Attack chaining for web exploitation

Security misconfiguration

Stored Cross Site Scripting

Session Hijacking

Privilege Escalation

Arbitrary file upload

Remote Code Execution

Page 56: Attack chaining for web exploitation

How can you start chaining?

Page 57: Attack chaining for web exploitation

Find more vulnerabilities

Understand the application

Analyze the bugs

Research on customer’s business

Make a story

Page 58: Attack chaining for web exploitation

Moral of the story!!

Every vulnerability needs to fixed irrespective of the risk

Remember it is Vulnerable Code + Weak Configuration

Page 59: Attack chaining for web exploitation

The other chainsInfrastructure Chains

Mobile chains

Data center attacks

Wireless hacks

Page 60: Attack chaining for web exploitation

Thanks

Page 61: Attack chaining for web exploitation
Page 62: Attack chaining for web exploitation

What to do with the bounties??

Page 63: Attack chaining for web exploitation

Educate a child

Page 64: Attack chaining for web exploitation

For more details

Page 65: Attack chaining for web exploitation

Questions??!!