Cli lient nt-side side attac tacks s con
- nti
tinued ued
1
Cli lient nt-side side attac tacks s con onti tinued ued 1 - - PowerPoint PPT Presentation
Cli lient nt-side side attac tacks s con onti tinued ued 1 Last week: security provided by SOP trusted content mafia.org <iframe src="http://mafia.org/a.html"> </iframe> bank.com SOP protects against malicious
1
2
3
4
5
6
7
8
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Same%20Origin%20Policy
9
<script> var document; document = {}; document.domain = ’bank.com’; // now we can access bank.com content ... </script>
10
11
12
13
14
15
websec 16
websec 17
https://www.visa:com@%32%32%30%2E%36%38%2E%32%31%34%2E... which translates to the IP address 220.68.214.213
https://paypal.com with a Cyrillic p
Browser bugs may offer more opportunities to confuse the user. In a famous Internet Explorer bug, a URL with a null character, e.g. http://paypal.com%00@mafia.com, would not display properly... Countermeasures: 1. Punycode which encodes Unicode as ASCII to reveal funny characters
www.xn-pypal-4ve.com
2. Domain highlighting to make it clear which part of URL is the domain name
websec 18
websec 19
websec 20
websec 21
See https://jameshfisher.com/2019/04/27/the-inception-bar-a-new-phishing- method/
22
See https://myki.com/blog/facebook-login-phishing-campaign and check the video there https://youtu.be/nq1gnvYC144
23
24
25
XSS attack Clickjacking UI redressing
26
27
28
29
30
31
32
33
34
35
36
http://www.cs.ru.nl/~erikpoll/websec/demo/clickjack_some_button.html http://www.cs.ru.nl/~erikpoll/websec/demo/clickjack_some_button_transparent.html
37
38
39
– For a demo, see http://www.cs.ru.nl/~erikpoll/websec/demo/framebusting1.html which includes a frame-busting iframe http://www.cs.ru.nl/~erikpoll/websec/demo/framebuster.html
40
41
42
43
44
45
websec 46
47
48
<form action=”transfer.php” method=”POST”> To: <input type=”text” name=”to”/> Amount: <input type=”text” name=”amount”/> <input type=”submit” value=”Submit”/> </form>
<form action=”http://bank.com/transfer.php” method=”POST”> <input type=”hidden” name=”to” value=”52.12.57.762”/> <input type=”hidden” name=”amount” value=”1000” /> <input type=”submit”/> </form> <script> document.forms[0].submit(); </script>
49
50
51
52
See Section 4.4.2 of “Surviving the Web” article
53
54
55
56
57
58
59
60
61
62
63
64
65