hacker attacks

Upload: mbahpingah

Post on 04-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Hacker Attacks

    1/7

    TTHHEETTWWEELLVVEEMMOOSSTTCCOOMMMMOONNAAPPPPLLIICCAATTIIOONN--

    LLEEVVEELLHHAACCKKAATTTTAACCKKSS

    By Steve Orrin, VP of Security and Technology

    A whitepaper from Watchfire

  • 8/13/2019 Hacker Attacks

    2/7

  • 8/13/2019 Hacker Attacks

    3/7

    THE TWELVE MOST COMMON APPLICATION-LEVEL HACK ATTACKS

    Copyright 2004. Watchfire Corporation. All Rights Reserved. 1

    IINNTTRROODDUUCCTTIIOONN

    While it is very difficult to secure applications on your website, application hacking is quitesimple. A hacker typically spends a few hours getting to know the web application by thinking

    like a programmer and identifying the shortcuts he would have created had he built theapplication. Then using nothing more than the web browser, the hacker attempts to interactwith the application and its surrounding infrastructure in malicious ways.

    Audits performed by Sanctum, acquired by Watchfire on July 26, 2004, on over 500 leadingwebsites containing over 2000 applications revealed that over 97% of the sites had majorapplication level problems that could be exploited in only a few hours or less. In almost all ofthe cases, these companies had done a good job of implementing security at the network level(i.e. firewalls and encryption), but these sites were still highly vulnerable because they allowedhackers to access valuable customer and corporate information through the application layer.

    TTHHEE1122MMOOSSTTCCOOMMMMOONNAATTTTAACCKKSS

    Based on our experience working with some of the leading enterprise customers from a widerange of regulated industries including financial services, government, and pharmaceuticals, wehave recognized that the following are the most common types of attacks occurring on theInternet today:

    Hack attack What hackers use it for How its done

    1. CookiePoisoning

    Identity theft/ SessionHijack

    By manipulating the information stored ina browser cookie, hackers assume theusers identity and have access to that

    users information. Many Webapplications use cookies in order to saveinformation (user-id, timestamp, etc.) onthe clients machine. Since cookies are notalways cryptographically secure, a hackercan modify them, thus fooling theapplication to change their values bypoisoning the cookie. Malicious userscan gain access to accounts that are nottheir own and perform activities on behalfof that user.

    2. Hidden FieldManipulation

    eShoplifting Hackers can easily change hidden fields ina page source code to manipulate the priceof an item. These fields are often used tosave information about the clients session,eliminating the need to maintain acomplex database on the server side.Because e-Commerce applications usehidden fields to store the prices of their

  • 8/13/2019 Hacker Attacks

    4/7

    THE TWELVE MOST COMMON APPLICATION-LEVEL HACK ATTACKS

    Copyright 2004. Watchfire Corporation. All Rights Reserved. 2

    Hack attack What hackers use it for How its done

    merchandise, our auditors were able toview the sites source codes, find thehidden field and alter the prices. In a realworld scenario, no one would have

    discovered the change and the companywould have shipped the merchandise atthe altered prices and may even have senta rebate.

    3. ParameterTampering

    Fraud Changing information in a sites URLparameters. Because many applicationsfail to confirm the correctness of CGIparameters embedded inside a hyperlink,parameters can be easily altered to, forexample, allow a credit card with a$500,000 limit, skip a site login screen, andgive access to alternate orders andcustomer information.

    4. Buffer Overflow Denial of Service/Closure of business

    By exploiting a flaw in a form to overloada server with excess information, hackerscan often cause the server to crash andshut down the website.

    5. Cross-SiteScripting

    Hijacking/ Identity Theft When hackers inject malicious code into asite, the false scripts are executed in acontext that appears to have originatedfrom the targeted site, giving attackers fullaccess to the document retrieved, andmaybe even sending data contained in thepage back to the attacker.

    6. Backdoor andDebug Options

    Trespassing Oftentimes, programmers will leave debugoptions in the code to test the site before itgoes live. Sometimes, in haste, they willforget to close the holes, giving hackersfree access to sensitive information.

    7. ForcefulBrowsing

    Breaking and Entering By subverting the application flow,hackers can access information and partsof the application that should normally beinaccessible, such as log files,administration facilities and application

    source code.8. HTTP Response

    SplittingPhishing, Identity theftand eGraffiti

    Hackers can poison web caches both at thesite and on intermediate systems to changeweb pages in the cache and perform avariety of attacks against users withenhanced abilities to conceal theiractivities.

    9. Stealth Concealing Weapons Often hackers conceal dangerous

  • 8/13/2019 Hacker Attacks

    5/7

    THE TWELVE MOST COMMON APPLICATION-LEVEL HACK ATTACKS

    Copyright 2004. Watchfire Corporation. All Rights Reserved. 3

    Hack attack What hackers use it for How its done

    Commanding commands via a Trojan horse with theintent to run malicious or unauthorizedcode that is damaging to the site.

    10. 3rd Party

    Misconfiguration

    Debilitating a Site Since vulnerabilities are posted and

    patches made available on public websites(such as www.securityfocus.com), hackersare alerted to new vulnerabilities as theyarise. For example, through aconfiguration error a hacker could create anew database that renders the existing oneunusable by the site.

    11. Knownvulnerabilities

    Taking control of the site Some technologies used in sites haveinherent weaknesses that a persistenthacker can exploit. For example, MicrosoftActive Server Page (ASP) technology can

    be exploited to gain the administratorspasswords and take control of the entiresite.

    12. XML & WebServicesVulnerabilities

    New layers of attackvectors and malicious use

    New infrastructures and protocolssupporting XML-based applications, bothindependent and integrated into existingweb applications, pose significant businessrisk by introducing vulnerabilities into theinfrastructure, protocols and content. Inaddition, new types of attacks can nowtake advantage of XMLs flexibility andrichness to affect all of the above-mentioned negative outcomes. Some of thevulnerabilities in XML include: entityexpansion, SQL injection in XQuery, XPathinjection, as well as various methods ofdenial of service attack.

    CCOONNCCLLUUSSIIOONNWhy do these vulnerabilities exist? The continuous cycle of auditing applications and trying to

    keep up with the latest patches is a constant battle against hackers who are armed withautomated tools to scout out the newest vulnerabilities. While virtually all sites today attempt toachieve application-level security manually and ultimately fail, new automated tools haverecently become available that allow auditors, developers and QA professionals to performvulnerability assessments and ethical hacks that catch the vulnerabilities before the hackers do.

  • 8/13/2019 Hacker Attacks

    6/7

    THE TWELVE MOST COMMON APPLICATION-LEVEL HACK ATTACKS

    Copyright 2004. Watchfire Corporation. All Rights Reserved. 4

    GGUUIIDDEELLIINNEESSTTOODDEEVVEELLOOPPIINNGGSSEECCUURREEAAPPPPLLIICCAATTIIOONNSS

    With the explosion of web-enabled applications, a new reality has emerged. While you wantusers to come to your site and interact with the application, to protect your organization youneed to be paranoid and build your site assuming the user will try to manipulate theapplication. Only information that is derived from the enterprise (i.e. the server) can be trusted

    and everything else (i.e. the client) is always potentially dangerous.

    Therefore, the first guidelinefor developing a secure web application is: Never trust anyinformation that comes from the client, and never assume anything about it.All security decisionsmust be made with the underlying assumption that anything that can theoretically bemanipulated by the user will be manipulated in reality. Never assume that just because a usersupposedly uses a specific tool, that this tool will put any constraints on his actions. Forexample, the fact that the browser does not show the hidden fields in the HTML of the pagedoes not mean they cannot be seen by looking at the traffic, and manipulated when sent back tothe server.

    The second guideline is:It is always easier to secure simple logic than complex logic.This actuallycomplements the first guideline as it relates to the usage of logic on the client. The use of client-side logic (such as scripts written in JavaScript or VBScript) might enhance the user experiencewith the application, but it has serious effects on the sites security. Using client-side logic as asecurity mechanism by checking information on the client is easily subverted since themechanism can be bypassed. For example, having JavaScript verification of constraints on formparameters can easily be bypassed by directly creating the request outside the browser. Inaddition, any changes to the application logic or flow by changing links or parameter values,creates a complex program with multiple sources of flow instead of a single unified point or asimple flow structure.

    RREECCOOMMMMEENNDDEEDDRREEAADDIINNGG

    For more information about developing secure web applications to combat these top 12 hackattacks, please download our whitepaper, Developing and Deploying Secure WebApplications, at https://www.watchfire.com/securearea/whitepapers.aspx?id=6

    AABBOOUUTTWWAATTCCHHFFIIRREEWatchfire helps organizations manage their online business by providing software solutions tominimize online risk and maximize channel effectiveness. These solutions let ebusiness,

    marketing, legal, compliance, and IT departments measure, manage, improve and secure theironline channels. We analyze online content and applications and generate managementintelligence dashboards that report on visitor behavior, quality, data privacy, web applicationsecurity, and accessibility issues.

    Watchfire recently acquired Sanctum, the pioneer in web application security testing and firewallsoftware. Sanctum's web application security testing software, combined with Watchfire's Privacysolutions, help organizations institute comprehensive online risk management programs.

  • 8/13/2019 Hacker Attacks

    7/7

    THE TWELVE MOST COMMON APPLICATION-LEVEL HACK ATTACKS

    Copyright 2004. Watchfire Corporation. All Rights Reserved. 5

    More than 250 enterprise organizations and government agencies, including AXA Financial,SunTrust Banks Inc., Veteran's Affairs, United States Postal Service, and Dell rely on Watchfireto monitor, measure and manage all aspects of the online business including quality, privacy,web application security, accessibility, user experience and visitor behavior. Watchfire's alliance

    and technology partners include IBM Global Services, PricewaterhouseCoopers, TRUSTe,Microsoft, Interwoven, Documentum and Mercury Interactive. Founded in 1996, Watchfire isheadquartered in Waltham, MA.

    To download a 7-day trial copy of AppScan QA, please go to:https://www.watchfire.com/securearea/appscanqadownload.aspx

    To download a 7-day trial copy of AppScan Audit, please go to:https://www.watchfire.com/securearea/appscanauditdownload.aspx