This document discusses cookie poisoning attacks against web applications. It explains that cookie poisoning allows attackers to impersonate valid users by forging session cookies, which maintain user identity. The document analyzes session token generation in two popular application servers and finds that the tokens can be predicted, allowing impersonation attacks. It recommends separating application functionality from security, with a dedicated security product handling session management.
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...Jakub Kau甜ny
油
The document discusses security issues with pull printing solutions. It provides three examples of security assessments conducted on different vendor products. In the first example, the proprietary protocol was reverse engineered and vulnerabilities like weak encryption were found. The second vendor took security seriously and responded quickly to reported issues. The third example showed vulnerabilities like a lack of encryption that could allow print job tampering. The document emphasizes that pull printing solutions require thorough security testing.
Dangerous google searching for secretsMathivanan M
油
This document discusses how Google can be used to find confidential information and vulnerable systems on the internet. It provides examples of Google search queries that can locate specific versions of web servers, as well as queries to find unsecured installations of common web applications with known vulnerabilities like WebJeff Filemanager and Advanced Guestbook. The document encourages readers to think carefully about the type of sensitive data that users carelessly make public and how it could aid attackers.
Etude PwC sur les dirigeants africains (2013)PwC France
油
pwc.to/18Uw7VU
PwC a interrog辿 301 dirigeants dans 19 pays africains : Angola, Bostwana, Cameroun, Congo Brazzaville, R辿publique D辿mocratique du Congo, Gabon, Ghana, C担te dIvoire, Kenya, Mozambique, Namibie, Nigeria, Rwanda, Afrique du Sud, Tanzanie, Tunisie, Ouganda, Zambie et Zimbabwe. Les 辿quipes de PwC ont 辿galement men辿 30 entretiens qualitatifs avec des dirigeants dentreprises pour approfondir leur analyse.
The document contains URLs and search terms related to discovering sensitive information from websites, including paths that may contain passwords, log files, and database files containing private user data. Many of the entries reference common locations for files containing passwords, user accounts, and order/transaction information. The list appears to be search queries and site paths that could potentially reveal private or restricted backend systems data.
The document contains a list of search strings that can be used to find potential vulnerabilities on websites and web applications. Some of the search strings look for pages indicating login portals for administrative access, content management systems, and other common internet-facing applications. Other search strings try to identify specific applications or technologies like vBulletin, ColdFusion, and iSecure. The overall document appears to be sharing ways to search for unprotected administrative or backend interfaces online.
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
油
Stop guessing and wasting your time on networks and strategies that dont work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Cookie poisoning is a technique used to hack web applications. It involves tampering with cookies to assume another user's identity on a site. The paper discusses how application servers can help solve session management issues but also present new problems if cookies are not properly encrypted. It concludes by noting comments from software vendors about strengthening session management and cookie security.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
Banking and Modern Payments System Security AnalysisCSCJournals
油
Cyber-criminals have benefited from on-line banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, we try to predict how hacking tools might evolve. We briefly survey the state-of-the-art tools developed by black- hat hackers and conclude that they could be automated dramatically. To demonstrate the feasibility of our predictions and prove that many two-factor authentication schemes can be bypassed, we have analyzed banking and modern payments system security.
In this research we will review different payment protocols and security methods that are being used to run banking systems. We will survey some of the popular systems that are being used today, with a deeper focus on the Chips, cards, NFC, authentication etc. In addition, we will also discuss the weaknesses in the systems that can compromise the customer's trust.
How to prevent cyber terrorism taraganaGilles Sgro
油
This document discusses a software called Validy SoftNaos that aims to prevent cyberterrorism, software piracy, and data theft through a combination of software transformation and a secure USB token hardware. It works by relocating parts of software code and data to the secure hardware token, requiring the token to be connected for the software to run. This is intended to strengthen software protection without compromising user privacy or control. The document provides technical details on how Validy SoftNaos protects software and ensures integrity through its use of encryption and the secure token. It also outlines how users can install and use the Validy SoftNaos evaluation software.
This document discusses enhancing security through token generation in a distributed environment. It proposes a new token generation scheme to encrypt user data with specified key parameters, making resources more robust. The token generation scheme would add security for both authentication and authorization. Existing algorithms focus on encrypting data on the user side, which incurs high computational and communication costs. The document suggests a token generation algorithm for distributed data files that provides secure and dependable server storage while maintaining low overhead. It analyzes related work on token-based authentication and security techniques to provide context.
This was my undergraduate final project presentation. Research paper of this presentation also published in IFOST,2013 and indexed in IEEE digital library.
Break Loose Acting To Forestall Emulation BlastIRJET Journal
油
This document proposes a new approach to detect phishing sites using visual cryptography, linear programming algorithms, and random pattern algorithms. The approach involves generating an image captcha during user registration by encoding a secret key into an image. This image is then split into two shares - one stored on the server and one given to the user. During login, the shares are combined to reconstruct the original image captcha, which the user must enter correctly to log in. This helps validate that the site is legitimate and not a phishing site impersonating it. The approach aims to improve online security and prevent fraud by making it difficult for phishing sites to steal users' credentials.
This document provides an overview of NetWatcher's managed detection and response security services. It describes NetWatcher's cloud-based security stack that provides enterprise-level security capabilities typically reserved for large organizations to SMBs through an affordable software-as-a-service model. The summary highlights NetWatcher's security tools and features like sensors, endpoint agents, threat intelligence, compliance reporting, vulnerability scanning, and a customer portal for viewing alerts and scores.
Enabling cloud storage auditing with verifiableKamal Spring
油
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the clients secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.
Architecture:
This document proposes a system for multi-factor authentication using one-time passwords (OTPs) generated on a user's mobile device without needing an internet or SMS connection. The system would work by registering user devices based on identifiers like IMEI and IMSI numbers. During login, the server would send random index variables to the mobile app to generate an OTP using those values, a secret seed derived from the device identifiers, and cryptographic hashing functions. If the server-generated and mobile app-generated OTPs match, access would be granted. This approach aims to securely generate OTPs offline to strengthen authentication without relying on SMS or internet connections.
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
油
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the users identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
This document discusses human and technological aspects of cyber threats facing universities. It notes that while increased data and connectivity enable opportunities, they also present cybersecurity risks that could threaten an organization's existence. The challenges for IT security leaders are to balance security awareness with business needs. Recent attacks have shown blending of new and old techniques, resulting in highly evasive threats. The document also describes the four key steps in security authentication: identification, authentication, authorization, and accountability. It stresses integrating these steps is vital for securing networks against various attacks.
Here are the key points about security enhancements for IEEE 802.11 wireless LANs through Wired Equivalent Privacy (WEP) protocol:
- WEP was the original security protocol for 802.11 wireless networks. It aimed to provide a level of security comparable to that of a wired network.
- WEP uses RC4 stream cipher for confidentiality. A pre-shared key (PSK) is used by both the client and access point to encrypt packets.
- The main weaknesses of WEP are: small key size (40-bit or 104-bit), use of static keys, no key management. This makes it vulnerable to eavesdropping and traffic injection attacks.
- To address
This document discusses security issues related to ecommerce systems. It covers types of threats like disasters, security breaches, errors and bugs. It also discusses controls like encryption, authentication, digital signatures and certificates to secure systems and transactions. The document emphasizes that security is important from the initial design phase and throughout a system's lifecycle to protect businesses and customer data.
Biggest info security mistakes security innovation inc.uNIX Jim
油
The document discusses five common information security mistakes organizations make: 1) over-relying on network defenses and not focusing enough on application security, 2) believing technology alone will solve security issues without proper training and processes, 3) making assumptions about people's abilities and behaviors, 4) thinking secure software is too costly, and 5) focusing only on recent threats instead of long-term strategies. It provides examples to illustrate these mistakes and recommends organizations do a self-assessment, create an internal security team, ask tough questions, and educate employees to avoid these issues.
IRJET- Secure Banking System using Block Chain TechnologyIRJET Journal
油
This document discusses using blockchain technology to improve security in the banking sector. It proposes a secure banking system using blockchain that stores transaction and account details in encrypted blocks linked together. Each block contains data, hash values, and the hash of the previous block, making it difficult for hackers to alter records. The system would use MD5 hashing for passwords and manage user identities, bank operations, and ensure transparency. Experimental results show how user details, transactions, and admin functions would work on the blockchain-based system. In conclusion, the document discusses how blockchain can strengthen security for financial records and monitoring.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, thats not security. Thats obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the worlds best safecrackers can study it and you still cant open the safe, thats security.
This document provides an overview of a proposed mobile-based software token system for two-factor authentication. The system aims to replace existing hardware and computer-based software tokens by using mobile phones. It consists of software installed on client mobile phones, a server, and a GSM modem. The system can generate one-time passwords locally on the phone or via SMS from the server. Algorithms and factors like IMEI, IMSI, username, and PIN are used to securely generate unique passwords. Functional requirements include modules for password generation, client design, and server design. Non-functional requirements address availability, efficiency, flexibility, portability, integrity, and scalability.
IRJET- Development of Uncrackable SoftwareIRJET Journal
油
This document discusses challenges with developing uncrackable software and proposes potential solutions. It describes how software cracking works by modifying programs to gain unauthorized access. Existing approaches like virtual machines and encryption are analyzed, but have limitations. Virtual machines reduce performance and encryption approaches can still be broken by analyzing the decryption process and keys used. The document concludes that truly uncrackable software would need to avoid decrypting encrypted codes on the user's device, to prevent the user from accessing decryption keys and algorithms.
The document discusses the emerging threat of man-in-the-browser attacks that can modify online transactions without the user's knowledge. These attacks circumvent all existing authentication methods by targeting transactions after authentication. Potential solutions discussed include developing a secure, hardened browser without extensions or scripts that is tightly coupled to cryptography. However, there would be no way for servers to reliably identify use of a secure browser versus an insecure one.
Dragonfly: Cyberespionage Attacks Against Energy SuppliersSumutiu Marius
油
The document summarizes a cyberespionage campaign called "Dragonfly" that targeted energy companies, mainly in Europe and the US, from 2011 onward. The attackers initially focused on defense and aviation firms before shifting to energy in 2013. They used spear phishing emails, watering hole attacks exploiting legitimate websites, and compromising software updates to install Backdoor.Oldrea and Trojan.Karagany malware. Analysis of the malware compilers suggests the attackers worked mostly Monday-Friday 9am-6pm in the UTC+4 time zone.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
Banking and Modern Payments System Security AnalysisCSCJournals
油
Cyber-criminals have benefited from on-line banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, we try to predict how hacking tools might evolve. We briefly survey the state-of-the-art tools developed by black- hat hackers and conclude that they could be automated dramatically. To demonstrate the feasibility of our predictions and prove that many two-factor authentication schemes can be bypassed, we have analyzed banking and modern payments system security.
In this research we will review different payment protocols and security methods that are being used to run banking systems. We will survey some of the popular systems that are being used today, with a deeper focus on the Chips, cards, NFC, authentication etc. In addition, we will also discuss the weaknesses in the systems that can compromise the customer's trust.
How to prevent cyber terrorism taraganaGilles Sgro
油
This document discusses a software called Validy SoftNaos that aims to prevent cyberterrorism, software piracy, and data theft through a combination of software transformation and a secure USB token hardware. It works by relocating parts of software code and data to the secure hardware token, requiring the token to be connected for the software to run. This is intended to strengthen software protection without compromising user privacy or control. The document provides technical details on how Validy SoftNaos protects software and ensures integrity through its use of encryption and the secure token. It also outlines how users can install and use the Validy SoftNaos evaluation software.
This document discusses enhancing security through token generation in a distributed environment. It proposes a new token generation scheme to encrypt user data with specified key parameters, making resources more robust. The token generation scheme would add security for both authentication and authorization. Existing algorithms focus on encrypting data on the user side, which incurs high computational and communication costs. The document suggests a token generation algorithm for distributed data files that provides secure and dependable server storage while maintaining low overhead. It analyzes related work on token-based authentication and security techniques to provide context.
This was my undergraduate final project presentation. Research paper of this presentation also published in IFOST,2013 and indexed in IEEE digital library.
Break Loose Acting To Forestall Emulation BlastIRJET Journal
油
This document proposes a new approach to detect phishing sites using visual cryptography, linear programming algorithms, and random pattern algorithms. The approach involves generating an image captcha during user registration by encoding a secret key into an image. This image is then split into two shares - one stored on the server and one given to the user. During login, the shares are combined to reconstruct the original image captcha, which the user must enter correctly to log in. This helps validate that the site is legitimate and not a phishing site impersonating it. The approach aims to improve online security and prevent fraud by making it difficult for phishing sites to steal users' credentials.
This document provides an overview of NetWatcher's managed detection and response security services. It describes NetWatcher's cloud-based security stack that provides enterprise-level security capabilities typically reserved for large organizations to SMBs through an affordable software-as-a-service model. The summary highlights NetWatcher's security tools and features like sensors, endpoint agents, threat intelligence, compliance reporting, vulnerability scanning, and a customer portal for viewing alerts and scores.
Enabling cloud storage auditing with verifiableKamal Spring
油
Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed and studied. To address the challenge, existing solutions all require the client to update his secret keys in every time period, which may inevitably bring in new local burdens to the client, especially those with limited computation resources such as mobile phones. In this paper, we focus on how to make the key updates as transparent as possible for the client and propose a new paradigm called cloud storage auditing with verifiable outsourcing of key updates. In this paradigm, key updates can be safely outsourced to some authorized party, and thus the key-update burden on the client will be kept minimal. Specifically, we leverage the third party auditor (TPA) in many existing public auditing designs, let it play the role of authorized party in our case, and make it in charge of both the storage auditing and the secure key updates for key-exposure resistance. In our design, TPA only needs to hold an encrypted version of the clients secret key, while doing all these burdensome tasks on behalf of the client. The client only needs to download the encrypted secret key from the TPA when uploading new files to cloud. Besides, our design also equips the client with capability to further verify the validity of the encrypted secret keys provided by TPA. All these salient features are carefully designed to make the whole auditing procedure with key exposure resistance as transparent as possible for the client. We formalize the definition and the security model of this paradigm. The security proof and the performance simulation show that our detailed design instantiations are secure and efficient.
Architecture:
This document proposes a system for multi-factor authentication using one-time passwords (OTPs) generated on a user's mobile device without needing an internet or SMS connection. The system would work by registering user devices based on identifiers like IMEI and IMSI numbers. During login, the server would send random index variables to the mobile app to generate an OTP using those values, a secret seed derived from the device identifiers, and cryptographic hashing functions. If the server-generated and mobile app-generated OTPs match, access would be granted. This approach aims to securely generate OTPs offline to strengthen authentication without relying on SMS or internet connections.
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
油
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the users identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
This document discusses human and technological aspects of cyber threats facing universities. It notes that while increased data and connectivity enable opportunities, they also present cybersecurity risks that could threaten an organization's existence. The challenges for IT security leaders are to balance security awareness with business needs. Recent attacks have shown blending of new and old techniques, resulting in highly evasive threats. The document also describes the four key steps in security authentication: identification, authentication, authorization, and accountability. It stresses integrating these steps is vital for securing networks against various attacks.
Here are the key points about security enhancements for IEEE 802.11 wireless LANs through Wired Equivalent Privacy (WEP) protocol:
- WEP was the original security protocol for 802.11 wireless networks. It aimed to provide a level of security comparable to that of a wired network.
- WEP uses RC4 stream cipher for confidentiality. A pre-shared key (PSK) is used by both the client and access point to encrypt packets.
- The main weaknesses of WEP are: small key size (40-bit or 104-bit), use of static keys, no key management. This makes it vulnerable to eavesdropping and traffic injection attacks.
- To address
This document discusses security issues related to ecommerce systems. It covers types of threats like disasters, security breaches, errors and bugs. It also discusses controls like encryption, authentication, digital signatures and certificates to secure systems and transactions. The document emphasizes that security is important from the initial design phase and throughout a system's lifecycle to protect businesses and customer data.
Biggest info security mistakes security innovation inc.uNIX Jim
油
The document discusses five common information security mistakes organizations make: 1) over-relying on network defenses and not focusing enough on application security, 2) believing technology alone will solve security issues without proper training and processes, 3) making assumptions about people's abilities and behaviors, 4) thinking secure software is too costly, and 5) focusing only on recent threats instead of long-term strategies. It provides examples to illustrate these mistakes and recommends organizations do a self-assessment, create an internal security team, ask tough questions, and educate employees to avoid these issues.
IRJET- Secure Banking System using Block Chain TechnologyIRJET Journal
油
This document discusses using blockchain technology to improve security in the banking sector. It proposes a secure banking system using blockchain that stores transaction and account details in encrypted blocks linked together. Each block contains data, hash values, and the hash of the previous block, making it difficult for hackers to alter records. The system would use MD5 hashing for passwords and manage user identities, bank operations, and ensure transparency. Experimental results show how user details, transactions, and admin functions would work on the blockchain-based system. In conclusion, the document discusses how blockchain can strengthen security for financial records and monitoring.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, thats not security. Thats obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the worlds best safecrackers can study it and you still cant open the safe, thats security.
This document provides an overview of a proposed mobile-based software token system for two-factor authentication. The system aims to replace existing hardware and computer-based software tokens by using mobile phones. It consists of software installed on client mobile phones, a server, and a GSM modem. The system can generate one-time passwords locally on the phone or via SMS from the server. Algorithms and factors like IMEI, IMSI, username, and PIN are used to securely generate unique passwords. Functional requirements include modules for password generation, client design, and server design. Non-functional requirements address availability, efficiency, flexibility, portability, integrity, and scalability.
IRJET- Development of Uncrackable SoftwareIRJET Journal
油
This document discusses challenges with developing uncrackable software and proposes potential solutions. It describes how software cracking works by modifying programs to gain unauthorized access. Existing approaches like virtual machines and encryption are analyzed, but have limitations. Virtual machines reduce performance and encryption approaches can still be broken by analyzing the decryption process and keys used. The document concludes that truly uncrackable software would need to avoid decrypting encrypted codes on the user's device, to prevent the user from accessing decryption keys and algorithms.
The document discusses the emerging threat of man-in-the-browser attacks that can modify online transactions without the user's knowledge. These attacks circumvent all existing authentication methods by targeting transactions after authentication. Potential solutions discussed include developing a secure, hardened browser without extensions or scripts that is tightly coupled to cryptography. However, there would be no way for servers to reliably identify use of a secure browser versus an insecure one.
Dragonfly: Cyberespionage Attacks Against Energy SuppliersSumutiu Marius
油
The document summarizes a cyberespionage campaign called "Dragonfly" that targeted energy companies, mainly in Europe and the US, from 2011 onward. The attackers initially focused on defense and aviation firms before shifting to energy in 2013. They used spear phishing emails, watering hole attacks exploiting legitimate websites, and compromising software updates to install Backdoor.Oldrea and Trojan.Karagany malware. Analysis of the malware compilers suggests the attackers worked mostly Monday-Friday 9am-6pm in the UTC+4 time zone.
The document discusses hacking and web application security. It covers the security landscape, hacking techniques like information gathering, SQL injection, cross-site scripting, and security threats. It also discusses the philosophies of black hat, grey hat and white hat hackers. The presenter's agenda includes explaining hacking methodology and demonstrating security vulnerabilities to emphasize the importance of secure web application development.
Shellcode Disassembling - Reverse EngineeringSumutiu Marius
油
This document provides a basic guide to reverse engineering Linux x86 shellcode. It summarizes reversing two sample shellcodes: 1) A simple shellcode that reads the /etc/passwd file, and 2) An XOR encrypted shellcode that launches a new ksh shell with root privileges. It explains breaking down the shellcode using a debugger to understand what it is doing by examining registers, system calls and related functions. The goal is to understand how the shellcode works rather than just trusting its described purpose.
This document summarizes a presentation on hacking VoIP systems. It begins with introductions of the presenters and an overview of VoIP security risks. The agenda is then outlined, covering footprinting, scanning, and enumerating VoIP systems to obtain information. Techniques for exploiting the underlying network through man-in-the-middle attacks and eavesdropping are discussed. Finally, exploiting VoIP applications through fuzzing, denial of service, and signaling manipulation will be covered.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
油
This document discusses layer 2 security attacks on Ethernet switches and their mitigation. It begins with an overview of layer 2 attacks and caveats. It then discusses specific MAC address attacks like CAM overflow attacks, which can be used to flood a switch's CAM table and cause traffic to flood on a VLAN. The document recommends port security features on switches to mitigate MAC flooding attacks by limiting the number of MAC addresses that can be learned or used on a particular port.
This document discusses shellcodes, which are machine language payloads that are executed directly by the processor. It defines different types of shellcodes like local, remote, egg-hunt, and omelet shellcodes. It also explains the x86 and x86_64 calling conventions used in Linux and provides examples of x86 and x86_64 shellcode implementations. Additional resources on shellcodes are referenced at the end.
cyber hacking and cyber fraud by internet online moneyVEENAKSHI PATHAK
油
Cyber fraud is a blanket term to describe crimes committed by cyberattacks via the internet. These crimes are committed with the intent to illegally acquire and leverage an individual's or businesss sensitive information for monetary gain
10 Critical Skills Kids Need in the AI EraRachelDines1
油
What skills do the next generation need to thrive in the age of AI? Exploring the benefits of AI and the potential risks when it comes to the next generation.
Learn the key differences between the Internet and WAN. Understand how high Internet plans and private networks can serve different purposes for businesses.
Building a Multiplatform SDKMAN in JavaFX.pdfJago de Vreede
油
SDKMAN is one of the most popular ways to install/upgrade Java or other build tooling on your system. It works great from the command line, but what if you could bring its power to a graphical interface? And what if it worked seamlessly on Windows too? In this talk, we will use SDKMAN as an example of how to build a multiplatform native application using JavaFX for the UI and GraalVM to compile native images. We will dive into the process of creating native apps with GraalVM, distributing them with GitHub, and identifying some limitations of native Java applications. Plus, well explore alternative methods for shipping native apps across platforms. By the end of this session, you will have practical insights on how to build and distribute native apps with or without JavaFX.
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6APNIC
油
Subha Shamarukh, Internet Resource Analyst at APNIC, presented on 'RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6' at the Bangladesh Internet Governance Forum held in Dhaka on 29 January 2025.
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...CartCoders
油
CartCoders offers specialized Shopify integration services to enhance your eCommerce store's functionality and user experience. Connect your Shopify store seamlessly with essential software and applications. Perfect for businesses aiming to streamline operations and boost efficiency.
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...TANGKI4D
油
MODAL 50RIBU JACKPOT 10JUTA
BERMAIN DI STARLIGHT PRINCESS
TUNGGU APA LAGI MAIN KAN SEKARANG
GUNAKAN POLA BERMAIN REKOMENDASI KAMI
3x MANUAL SPIN DC ON-OFF
10x TURBO Spin DC OFF
2x MANUAL Spin DC ON-OFF
20x CEPAT Spin DC OFF
COMBO DENGAN BUY FITURE SPIN
#Tangki4dexclusive #tangki4dlink #tangki4dvip #bandarsbobet #idpro2025 #stargamingasia #situsjitu #jppragmaticplay
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...TANGKI4D
油
Hacking Web Aplications using Cookie Poisoning
1. 造2002 Sanctum, Inc. www.SanctumInc.com1
Hacking Web Applications Using Cookie Poisoning
Amit Klein (amit.klein@sanctuminc.com) is security group manager for Sanctum, Inc.
Summary
Cookie poisoning is a known technique mainly for achieving impersonation and breach of
privacy through manipulation of session cookies, which maintain the identity of the client. By
forging these cookies, an attacker can impersonate a valid client, and thus gain information and
perform actions on behalf of the victim. The ability to forge such session cookies (or more
generally, session tokens) stems from the fact that the tokens are not generated in a secure way.
In this paper, we explain why session management (and session management security) is a
complex task (which is why it is usually left for commercial products). We describe how the
tokens are generated for two commercial application engines. We then analyze the strength of
each mechanism, explain its weakness, and demonstrate how such weakness can be exploited to
execute an impersonation/privacy breach attack. We discuss the feasibility of the attack. Finally,
we recommend an approach to session management which separates the security from the
functionality the latter is carried out by application engines, while the former should be
provided by a dedicated application security product.
The Sysiphian in-house session maintenance
In web application programming, Session Management is complex and awkward. The
programmer needs to worry about many aspects of session management which can defocus
him/her from the main goal implementing the business logic that makes the site unique and
profitable.
Specific issues are:
Session creation and identification how to ensure that when a new session is needed, it
is indeed created? The programmer must identify that a client has a need for a session,
create the session and assign the client a session.
Concurrency issues when two clients access the site simultaneously, each requiring a
new session, it is necessary to make sure that the session creation process will still
function correctly.
Session termination and timeout what triggers a session termination? How are the
resources of the terminated session recycled? What happens if the client tries to access
the site when the termination process is taking place? What happens when a client tries to
access a site with a stale session?
2. 造2002 Sanctum, Inc. www.SanctumInc.com2
Session data storage, multiple servers, fail-over where is the session data stored (on
disk? in RAM?)? What is the performance penalty? What happens in a multi-server site if
a client accesses a first server (and establishes a session with it) and then is directed (by a
load balancer) to a second server? What happens to the client session data in case the
original server crashes?
Security-wise, the following considerations must be made:
It should never be possible for one client to be able to predict the token another client
received, or is in the process of receiving, or will receive. This is obviously a must have
in order to prevent impersonation attacks and consequently breach of privacy.
Furthermore, it is desirable that a client will not be able to predict the next token he/she
will get when accessing the site. This is useful in minimizing the damage of stealing the
token while it travels (in the clear) to and fro, and while it is stored on disk at the client.
Any token should have a reasonable expiration period again, to minimize the damage of
it being stolen.
As can be seen, it is not very easy to fulfill all these requirements, especially if the session
mechanism is developed ad-hoc. The more intricate security requirements are definitely
something developers, especially ones not versed in security, may easily miss.
One recent example is the cookie mechanism that was employed by Verizon Wireless
(www.verizonwireless.com and www.app.airtouch.com). The security problem is mentioned in
the press (http://www.newsbytes.com/news/01/169781.html), and in technical resources
(http://online.securityfocus.com/archive/1/211520 - a report by Marc Slemko, dated September
1st
, 2001). To quote from the latter:
Cell phone bills are often very interesting things, since they contain
names, addresses, and a complete record of calls placed and received,
along with the approximate location the user was when the call was
made. I'm sure I'm not alone in expecting my provider to provide a
reasonable level of privacy for this data.
A typical URL used by this "my account" service is:
https://www.app.airtouch.com/jstage/plsql/ec_navigation_wrapper.nav_frame_display?p_se
ssion_id=3346178&p_host=ACTION
Note the p_session_id parameter. This is the only session identifier
used. They are assigned sequentially to each user as they login, and are
valid until the user logs out or the session times out. Obviously, this
makes it trivial to access the sessions of other users by guessing the
session ID. Automated tools to grab this information in bulk as users
login over time are also trivial.
As we see here, the problem is simple: the Verizon Wireless site assigns a token (in this case, it
appears as a parameter named p_session_id) to each logged-in visitor in the site. This token is
used to identify the visitor. The token value is sequentially incremented per each new visitor,
hence if youre a visitor and your p_session_id is N, the next visitor will be assigned N+1. This
is an extremely predictable mechanism, and it completely violates all security requirements
(although it probably fulfills all the functional requirements).
3. 造2002 Sanctum, Inc. www.SanctumInc.com3
Many other examples of insufficient security in tokens are demonstrated in the work of MIT
Laboratory for Computer Science (Dos and Donts of Client Authentication on the Web by
Kevin Fu, Emil Sit, Kendra Smith and Nick Feamster)
http://cookies.lcs.mit.edu/pubs/webauth:tr.pdf
So we see that it is difficult to come out with a good session management solution, let alone a
secure session management solution. This is one of the reasons why application servers are so
popular.
Application Servers/Engines a solution and a problem
An Application Server (or Application Engine) is a software program designed to make the life
of the application developer easy. It usually offers the programmer the ease of writing HTML
pages with directives for the server embedded in them, instructing the server to perform various
tasks. Most application servers provide the programmer an environment that takes care of the
session automatically, relieving the programmer from all the worries mentioned in the above
section.
Examples of application servers:
Microsoft ASP (Active Server Pages) runs on top of IIS.
Macromedia (formerly Allaire) ColdFusion
Apache Tomcat
Apache JServ
PHP
BEA WebLogic
IBM WebSphere
BroadVision
Some frequency analysis can be found here
(https://secure1.securityspace.com/s_survey/data/man.200203/cookieReport.html), through
associating the cookie names with the server that issues them. This is of course biased, since
some servers and sites use tokens in form parameters rather than in cookies.
The upside of application engines is the fact that they completely relieve the programmer from
worrying about session management. All functionality aspects of session management are taken
care of, usually much better than an in house programmer could have achieved.
The downside of application engines is the fact that they seem to relieve the programmer from
worrying about the security of the token, yet we can show that the harsh reality is far from that.
In fact, some very popular application engines do not provide secure tokens. As a result, the
programmer obtains a false sense of security.
We examined the tokens generated by two popular application servers. In both cases, we were
able to demonstrate that the token is not as random as it seems, and that it is possible (in one
case, with ease), to predict the values of the token for the next sessions (of a different client).
4. 造2002 Sanctum, Inc. www.SanctumInc.com4
Example 1 beating a time based token
The target of this attack is a very popular commercial application engine. The product uses two
cookies to identify a session. The pair formed by the two cookies identifies the session. The first
cookie is merely a counter, incremented once per new session. It probably ensures that no two
pairs are ever identical. The second cookie is the token cookie, apparently intended to secure the
pair by being unpredictable. Since it is very easy to predict the first cookie, we focus on the
second cookie, which well denote as TOKEN.
At first glance, TOKEN seems to be a sequence of random 8 decimal digits. The entropy
(amount of randomness) here is 108
= 226.57
which may be considered sufficient, considering that
its quite unfeasible to try such amounts of requests (100 million) against a site without
triggering some kind of alarm and human attention.
But, a closer look reveals that in fact, TOKEN obeys the following equation:
Let us denote by t the GMT time, in seconds, since 01/01/1970 00:00, as set on the
application server.
Let us denote by m the milliseconds portion of the tick counter on the application server.
Then:
TOKEN= ( 31415821 * (t + m) + 1 ) mod 100000000
It is interesting to note that t can be extracted from the HTTP Date header the server
sends back to the client together with the first time the cookies are set.
This means that the TOKEN cookie is quite predictable. In fact, if one knows a range of time T
t < T+T (in seconds) in which a cookie was generated, one can infer that TOKEN has one of
T+1000 values, which is a rather short list of values. Testing a bit more than a thousand values
against the server may take few minutes, in which the victim session is likely to remain active.
The outline of an attack algorithm is as following:
Obtain a first pair (id1, TOKEN1). Record t1 the server time (from the Date HTTP
header)
Wait T seconds.
Obtain a second pair (id2, TOKEN2). Record t2 the server time (from the Date HTTP
header)
if (id2 > id1 +1)
begin
// we have a victim session interjected here.
for (x= t1 ; x < t2 +1000 ; x++) // which is T+1000 iterations
begin
Try the pair (id1 +1, ( 31415821 * x + 1 ) mod 100000000)
end
end
5. 造2002 Sanctum, Inc. www.SanctumInc.com5
In fact, it is possible to improve this algorithm in some cases by using the fact that on some
operating systems, the tick counter does not have millisecond granularity, but rather a coarser
granularity of around 10msec. This can be used to reduce the search space even further.
The attack described above enables the attacker to impersonate a victim, provided that such
victim was assigned a cookie between the two samples the attacker made of the site cookies.
Since the attacker can repeat the algorithm as many times as he/she would like, it is possible for
him/her to obtain these cookies for all clients, at a price of sampling the site (say, one request
every minute), and additionally some 1060 requests per any new client discovered. Again, as
hinted above, it is possible to sample at closer intervals (once a second) and exploit the
granularity problem of the clock ticks, in which case it is probably possible to arrive at 100
requests per new client.
It is likely that if an attempt to impersonate a client is performed while the site is loaded with
traffic, then the additional hundreds/thousands of request would go unnoticed, at least
momentarily.
Example 2 When Random() isnt random
In this example, we deal with a still popular (yet a bit outdated) application engine. This engine
generates a single cookie for each new session. This cookie (which we shall name ID) comprises
of 3 mandatory fields (F1, F2 and F3), and one optional (server configuration dependent) field
(F4, preceded by a dot), concatenated. The fields are as following:
F1 = 6 characters (A-Z0-9) PRNG (Pseudo Random Number Generator) data,
represented in base 36 with leading zeroes.
F2 = 3 characters (A-Z0-9) server time (milliseconds), divided by 2000, mod 363
(=
46656), represented in base 36 with leading zeroes.
F3 = 3 characters (A-Z0-9) session count in this 2 second time slice, represented in base
36.
F4 = constant string (per server).
As can be seen, F4 (if it exists) is constant, and hence trivially predictable. F2 is simply the
server time (in seconds) divided by 2, modulo 46656, which is quite predictable, and F3 is not
too obscure as well as it is sequentially incremented in the 2 seconds time slice (always begins
at one).
The only interesting field is therefore F1. Apparently, it holds enough entropy to secure the
system, since it can assume 366
values (=231.0
). Yet again, what seems secure at first sight appears
not so secure when performing a full analysis. Explanation on how and why F1 can be predicted
is provided in Appendix A, since it is too long for inclusion here. The problem we exploited with
F1 is the fact that it uses a PRNG (Pseudo Random Number Generator), which in itself is
predictable. So knowing several values of F1 suffices to fully predict the PRNG, and hence
future (and past) values of F1.
6. 造2002 Sanctum, Inc. www.SanctumInc.com6
The outline of an attack is as following:
Preparation:
Obtain three IDs, in the shortest time intervals possible.
Extract the PRNG internal state (as explained in Appendix A).
Interception Cycle
Obtain an ID, and record the server time, t. For simplicity, assume t is even.
Find the PRNG internal state that was used to generate this ID (as explained in Appendix
A)
Wait T seconds (where T is even)
Obtain a new ID.
Advance the PRNG, and record all internal states between the PRNG state of the old ID
and the PRNG state that generated this ID (As explained in Appendix A). Let the list of internal
values be L
// T/2 iterations:
for (T=t; T<t+T; T+=2)
begin
for each internal PRNG state L, i.
begin
Try an ID cookie consisting of:
F1=generate from sample of PRNG at state i and i+1;
F2=T;
F3=1; // first session in this 2-second time period
F4=F4 of any ID above; //constant per server
end
end
As can be seen, it is feasible, although not trivial, to predict some ID cookies. For feasibility, it is
required that the time interval (T) be short (with respect to the expected usage of the server), in
order to minimize the length of L (the list of possible internal PRNG states). If these intervals are
indeed very short (less than two seconds), it may be possible, with correct timing, to tell whether
a new session was interjected at the current 2 second time slice, which makes the attack more
effective (since it requires launching the additional requests only when it is known that a new
victim session was indeed created). It should also be mentioned that in order not to lose
synchronization (of the PRNG internal state) with the site, it is necessary to keep requesting a
new ID from time to time, in order to advance the attackers PRNG internal state to the new
value. It should be remembered that the PRNG is likely to be used for many purposes, not just
the creation of sessions. This means that the site may use the PRNG intensively, thus causing a
quick de-synchronization (to counter which it is necessary to re-sync at close time intervals, e.g.
every few minutes). On the other hand, it may be possible to get a clearer glimpse of the internal
PRNG state by inspecting other random values that may be used in the site. This may offer a
shortcut saving a lot of computation power.
7. 造2002 Sanctum, Inc. www.SanctumInc.com7
It should be noted, that once the attacker is in synch with the site, and if IDs are extracted
frequently enough, it is possible to impersonate any client at the expanse of sending few
(depends on the usage of the PRNG) requests.
What the involved vendors say
Vendor 1 acknowledged the weakness, and informed us that its customers should use SSL
certificates for session management. While this is perhaps a good idea for some customers (but
definitely not for all customers moving to SSL and SSL certificates is definitely not trivial, and
sometimes not possible), the documentation for its product leads the reader to believe that the
built-in session management is secure (they name it the client security token in their
documentation for developers). Also, the vendor does not make this suggestion public.
Vendor 2 acknowledged the weakness yet wrote us session cookies are -NOT- a replacement
for authentication tokens. A session cookie in conjunction with a random auth token or auth
login validation is both reasonable mechanisms. This should be true in designing session based
scripts - even where the session tokens are 'trusted' today. thus laying the responsibility in the
hands of the developers.
The two vendors, while technically acknowledging the problem, dismissed it as a non-security
issue. That is, both vendors assume their customers implement their own session security tokens,
not relying on the vendor tokens. The vendors, therefore, claim that their tokens are used (or
should be used) solely to better differentiate between different users, and not as a security
measure. In the documentation, we did not find any warning against using the token as a secure
session identifier. Furthermore, Vendor 1s documentation uses phrases that lead one to believe
that this token is secure. And in reality, of course, most sites use the tokens issued by vendors as
a secure session identifier, oblivious to the fact that it is weak.
In a sense, the application developer is back to square one: he/she cannot trust the built-in
session identification mechanism, and thus is forced to write his/her own such mechanism, with
best effort to fulfill all the requirements mentioned above and to avoid the delicate pitfalls of
cryptography.
Conclusion
We see session security falls between the cracks vendors dont do it right, dont care for it, or
delegate the responsibility for it to the developers, while in-house development is error-prone,
and requires a deep understanding of security.
In this paper, we provided real life examples for both insecure tokens in commercial application
engines, as well as in home grown applications.
Our solution is simple the world of web applications should consist of three components:
The application (which is developed in house, and expresses the business logic, as well as
the novelty and specialty of the company/site).
8. 造2002 Sanctum, Inc. www.SanctumInc.com8
The application environment (the application engine and web server, which enable easy
application development and focus on the application rather than on infrastructure).
Web application security component, which takes care of the application security, again
relieving the developers (and to some extent, the application engine developers too!)
from having to worry about secure implementation of their application.
In all the above cases, a web application firewall would have fortify the tokens generated by the
application engines (or by the in house developed application) transparently (the developer
neednt even be aware of this), and ensure, through using strong cryptography and security tested
mechanisms, that the tokens sent to the application are indeed genuine, and not forged.
9. 造2002 Sanctum, Inc. www.SanctumInc.com9
Appendix A Analysis of the PRNG Used in Example 2
The PRNG in example 2 is a linear congruence type PRNG. Its internal state consists of 48 bits
(the variable state). The PRNG is seeded once (that is, an initial value for state is provided),
and then advances in the following manner:
state = (state * 25214903917 + 11) mod 248
sample = state / 216
As can be seen, sample is a 32 bit number.
The ID generation mechanism concatenates two consecutive samples to form a 64 bit integer,
which may be negative (if the most significant bit is 1). Then, absolute value of this number is
taken, and mod 366
is applied to yield F1.
And now to some mathematics: we want to be able to predict the values sampled from this
PRNG.
We do get a direct glimpse at the state bits. To understand why, let us consider the mathematical
representation of F1. Let the two samples needed for F1s generation be denoted S1 and S2.
Then:
S1= [dont care]
S2 = state / 216
N= S1 * 232
+ S2
if (N 263
) N=264
-N //make sure N is positive i.e. most significant bit is 0.
F1=N mod 366
Since 366
= 212
* 312
, it follows that
F1 mod 212
= N mod 212
or F1 mod 212
= (-N) mod 212
And since N = S1 * 232
+ S2, it follows that
F1 mod 212
= S2 mod 212
or F1 mod 212
= (-S1) mod 212
We see, therefore, that F1 mod 212
provides us with two options for the 12 least significant bits
of S2, which, in turn are the bits 16-27 of state (denoting the least significant bit as 0 and the
most significant bit as 47).
Now, we can guess the 16 least significant bits of state, and together well have the 28 least
significant bits of state. We have 217
guesses (216
for the 16 least significant bits of state, and 2
for the original sign of N).
The number of guesses can be easily reduced by taking another sample, as close as possible (i.e.
with as few samples of PRNG in between), and verifying against the 11 bits of information (12
bits minus the sign bit). If it is possible to achieve two IDs with less than (say) 16 advances of
the PRNG in between, then with a calculation of 217
*16 we can reduce the number of guesses we
10. 造2002 Sanctum, Inc. www.SanctumInc.com10
have to 2^10. Applying this argument twice more will show that with 4 IDs generated close
enough, it is possible to come out with a single verified value for the 28 least significant bits of
state (for all IDs), with no more than few million calculations.
Finally, we can also guess the 20 most significant bits, and we can easily verify them using the
IDs we have, because once all the bits of state are known, it is possible to calculate F1
accurately.
In order to check all guesses at this phase, we need to perform few million calculations.
The above can be easily performed using a standard PC (Pentium-III or Pentium-4) in few
minutes or less.
After this, the full state of the PRNG becomes known. This enables to accurately follow the
PRNG to the future and to the past.
For example, if one has the current value of the PRNG, and an ID that was produced from the
PRNG after some advances have taken place, it is possible to find the PRNG state associated
with the ID, as well as all PRNG states in between (and the ID that may have been produced for
them) via simply advancing the PRNG and generating the ID, until the ID generated matches the
one obtained from the server. This provides both a list of possible IDs between the time the
PRNG was at the known state and the time the ID was obtained, as well as the current state of
the PRNG (the one matching the obtained ID).
It should be noted that an ID is obtained from sampling two consecutive states of the PRNG. But
since it is impossible to know how the PRNG is used, we must check every possibility for having
two consecutive pairs. So if the PRNG states are A, B, C and D we must list the IDs formed from
(A,B), (B,C) and (C,D).