Chapter 18: 1
Computer Security 3e
Dieter Gollmann
www.wiley.com/college/gollmann
Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 18: 1 Chapter 18: Web Security Chapter 18: 2 Web 1.0 browser HTML + HTTP CSS data request web server backend systems Chapter 18: 3 Web 1.0 Shorthand for
Chapter 18: 1
www.wiley.com/college/gollmann
Chapter 18: 2
Chapter 18: 3
web server backend systems browser HTTP request HTML + CSS data
Chapter 18: 4
Chapter 18: 5
Chapter 18: 6
Chapter 18: 7
www.wiley.com/WileyCDA/Section/id-302475.html?query=computer\%20security
URI; aligns the user’s view with the browser’s view. host URI
Chapter 18: 8
Chapter 18: 9
an internal representation of a web page used by browsers; required by JavaScript.
page.
Chapter 18: 10
Chapter 18: 11
(subscriber) and service provider.
private key, TLS with mutual authentication can be used.
Chapter 18: 12
Chapter 18: 13
Chapter 18: 14
Chapter 18: 15
client man-in-the-middle server SSL/TLS session SSL/TLS session
Chapter 18: 16
authenticator included by client in further HTTP requests.
located between client and server.
Chapter 18: 17
Chapter 18: 18
client server Server Hello, Cert, Done Client Hello MitM POST/secure/evil.html HTTP/1.1 key exch, cipher spec, finished change cipher spec, finished Client Hello hello request Client Hello cert, key exch, cert verify, change cipher spec, finished change cipher spec, finished, HTTP 1.1. ok Server Hello, Cert, CertReq, Done GET/secure HTTP/1.1
“secure” tunnel, server authenticated “secure” tunnel, mutual authentication
attacker’s HTTP request executed in the context of the mutually authenticated tunnel
Chapter 18: 19
treated as a specification of the service.
sends a malicious partially complete command in the first tunnel.
Chapter 18: 20
Chapter 18: 21
Chapter 18: 22
http://www.my.org/dir1/some.html success http://www.my.org/dir2/sub/another.html success https://www.my.org/dir2/some.html failure different protocol http://www.my.org:81/dir2/some.html failure different port http://host.my.org/dir2/some.html failure different host
Chapter 18: 23
all ac.uk domains open to same origin policy violations.
domain traversal cannot be applied (exceptions to exception).
Chapter 18: 24
the same server.
Chapter 18: 25
Chapter 18: 26
privileges at client (origin based access control).
Chapter 18: 27
page; in a search for a string that includes some HTML special characters code may be injected.
Chapter 18: 28
Chapter 18: 29
attacker‘s Web server Web server in trusted domain Page Click HTML result page, script e.g. in image tag script reflected in result page attack script hidden in image tag
Reflected XSS Stored XSS
page with attack script
Chapter 18: 30
Chapter 18: 31
attacker.com untrusted zone trusted zone applet that refers to URL malicious code in URL
Request for ‘innocent’ web page
Chapter 18: 32
its value back to attacker, e.g. as HTTP GET parameter.
context of attacker’s web page.
Chapter 18: 33
Chapter 18: 34
encode dangerous characters.
Chapter 18: 35
Chapter 18: 36
(cookie, authenticated session,…).
Chapter 18: 37
Chapter 18: 38
bank server Page Click HTML result page, request in web form Web server attack.org authenticated tunnel attacker’s request submitted
victim
Chapter 18: 39
attacker.org untrusted zone target system page with malicious instructions in web form malicious instructions reflected to server in HTTP request user page click Authenticated tunnel