SlideShare una empresa de Scribd logo
1 de 46
Men in the Server Meet the Man in the
               Browser
Amichai Shulman, CTO
Agenda


    Quick Introduction
    Motivation
    Problem Definition
    Shape Based Tests
    Content Based Tests
    Overall Solution Strategy
    Summary




2
Introduction
Imperva Overview

                   Our mission.
                   Protect the data that drives business

                   Our market segment.
                   Enterprise Data Security

                   Our global business.
                   • Public Company,   Founded in 2002;
                   •   Global operations; HQ in Redwood Shores, CA
                   •   350+ employees
                   •   Customers in 50+ countries

                   Our customers.
                   1,300+ direct; Thousands cloud-based
                       •   4 of the top 5 global financial data service firms
                       •   4 of the top 5 global telecommunications firms
                       •   4 of the top 5 global computer hardware companies
                       •   3 of the top 5 US commercial banks
                       •   150+ government agencies and departments
Today’s Presenter
Amichai Shulman – CTO Imperva

 Speaker at Industry Events
   + RSA, Sybase Techwave, Info Security UK, Black Hat
 Lecturer on Info Security
   + Technion - Israel Institute of Technology
 Former security consultant to banks & financial services firms
 Leads the Application Defense Center (ADC)
   + Discovered over 20 commercial application vulnerabilities
      – Credited by Oracle, MS-SQL, IBM and others




         Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
Motivation
Client Side Attacks - Scope of Problem (1)
Major Attack Vectors


 Browser code
   + On decline over past 3
     years
   + Expected to rise over
     next 2 years
 Browser plug-ins
  (Java, Flash, PDF, Me
  dia Player etc.)
 OS libraries (graphics
  rendering)
Client Side Attacks - Scope of Problem (2)
    2010 Vulnerability Figures


 Client side                       Server side
       + 77 IE                        + Only 36 vulnerabilities
         vulnerabilites, 106            across IIS, Apache
         Firefox                        and Tomcat
         vulnerabilities, 188
         Chrome vulnerabilities
       + 73 Adobe Flash, 9
         Adobe Reader related
         vulnerabilities
       + 72 Various ActiveX
         related vulnerabilities

8
Client Side Attacks - Scope of Problem (3)
Malware Distribution Methods

   Drive-By-Download / Malvertizing
   Phishing, “Spear Phishing”
   Torrent and P2P
   Physical
Client Side Attacks - Scope of Problem (4)
2009 / 2010 Attack Figures

 A 2010 report by Kaspersky
   + ~600M attempts reported to KSN, more than 5 times increase
     over 2009
 Number of Zeus infected computers estimated at 10M
 Rustock spanned 1M computers
 40K new infections a day (with some being cleaned up)

    Consumers cannot be expected
    to cope with the technical
    problem on their own
From Consumer Attack to a Business Problem


 The threat to consumers is constantly growing
   +   Number of vulnerabilities
   +   Number of attacks
   +   Types of attacks
   +   Sophistication
 Usage is expanding beyond banking and popular retail
  applications
 We are passed the point of no return
   + Cannot expect average consumers to avoid infection and
     mitigate attacks alone
   + We cannot deny service to infected consumers
   + We cannot let the consumer bear the consequences of a
     compromise
From Consumer Attack to a Business Problem


 Potential consequences (of failing to do so):
   + Reduced on boarding rate
   + Reduced activity
   + Increased refunds
   + Increased insurance rates


        Consumer facing malware
        threatens online commerce*
        Forrester Feb 2011: Malware And Trojans And Bots, Oh My!
From Consumer Attack to a Business Problem


 Car User Safety      Online User Safety
Problem Definition
Client Side Trouble – Types of Interaction

 Key loggers
   + No interaction between malware and application
   + Offline interaction between attacker and application using stolen
     credentials
 Phishing
   + Some interaction between browser and actual application during
     attack
       – Could be used for detection of some Phishing campaigns
   + Offline interaction between attacker and application using stolen
     credentials
 Man in the Browser
   + Extensive interaction between malware and application during
     attack
   + Offline interaction between attacker and application using stolen
     credentials
Man in the Browser Attacks

 Attacker code running in context of victim’s browser
 AKA Proxy Trojan
 Original motivation
     + No need to attack infrastructure (DNS, tap into
       router, etc.)
     + Defeat SSL
 Additional benefits
     + Access to local resources
     + Access to application session data
 Prominent Actors
     + ZeuS, Gozi, URLZone, Sinowal, Limbo and SpyEye
     + Silentbanker



16
MitB Attacks - The Evolution of Proxy Trojans




        Key    Record     Inject     Manipulate
      logger   HTML       HTML        and inject
                data    elements    transactions




17
MitB Attacks - Proxy Trojans in Action


          Before                    After




18
MitB Attacks - Proxy Trojans in Action


          Before                    After




19
MitB Attacks - Proxy Trojans in Action


          Before                    After




20
MitB Attacks - Proxy Trojans in Action


          Before                    After




21
MitB Attacks - Proxy Trojans in Action


          Before                    After




22
Proxy Trojan Architecture




                             Web Application
     Client Machine




23
Proxy Trojan Architecture

                         Drop Server



                                       Inject Fake
                                       Transaction
                      Extract Data
     Tamper Page
                                                     Web Application
     Client Machine




                           Tamper Request



24
Shape Based Tests
An Observation


 Clean                       Infected




          Trojan Likes to Tamper Plain Traffic
Typical Changes by Trojan


 Encoding related headers
     + Enforce use of traffic that is easily tampered by the Trojan
     + Avoid HTTP/1.1 connections, compressed data
 Client type identification
     + Ensure identification by drop server and other attacker
       controlled components
 Additional parameters
     + Extra data provided by an unfortunate victim
     + Could represent client identification for attacker controlled
       components
 Parameter order
     + Expected from fake transactions

27
Shape Based Tests


 The application (or a device protecting the application)
  inspects the shape of incoming messages for changes
  typical to Trojans
 If a Trojan pattern is detect mark the client (IP address /
  session / request) as “infected”




28
Shape Based Tests in Action

                         Drop Server
                                                     Apply Shape Tests



                                       Inject Fake
                                       Transaction
                      Extract Data
     Tamper Page
                                                            Web Application
     Client Machine

                                                           Apply Shape Tests




                           Tamper Request



29
Challenges – Tracking Trojan Discrepancies


 Each Trojan may          Need to keep track of
  display a different       Trojans
  change                   Create a framework
 Changes may be            for shape based rules
  reflected in specific    Create a framework
  request types             for constructing shape
                            tests




30
Challenges – Avoiding False Positives


 Some real client       HTTP/1.1 200 OK
                         .
  devices do not         .
                         .
  support (or choose     Content-Encoding: gzip

  not to support)        Refresh: 2;url=infection_test.html?infected=no


  HTTP/1.1 or            <html>
                          ...........V*//W...Qzi...I...z...J:`.......T$......d.y.%@.^f.R,...(
                         <head>
                          ..y.:.J....9.V......%%...JV.J~.a...!..~@.Dqbkc...%6....
  compressed data        <script>window.navigate('infection_test.html?inf
                                 ected=yes')</script>
 Engage the browser     </head>
                         <body></body>
  in a challenge         </html>

  response protocol


31
Content Based Tests
Content Based Tests


 Current malware tampers HTML at the network layer
  (before it is interpreted by browser)
   + This is due to simplicity and robustness considerations
 Use client side code to verify integrity of HTML page
  content in coordination with the server
 Some solutions try to “provoke” the MitB into making
  changes. Then compare the HTML content to known
  Trojan behaviors
   + This can be avoided by careful configuration of the MitB
   + Requires constant chase after MitB configuration files
       – Construct an up-to-date database of “known behaviors”
Client / Server Content Verification


 Server computes a digest of the delivered HTML page
     + Random (invisible) elements are injected into the page before
       computation
 Server appends a page digest computation function to
  the HTML page
     + Computation function code includes a random salt
 When page is loaded into the browser, the computation
  function is invoked, computes the digest and sends it to
  the server for verification
 If the browser does not send back a digest then
  infection is assumed


34
Content Based Tests in Action

                              Drop Server          Compute Digest and Inject
                                                   Digest Computation Function



                                            Inject Fake
                                            Transaction
                       Extract Data
     Tamper Page
                                                                 Web Application
     Client Machine


                                                                 Compare Digests



                               Tamper Request

             Compute Digest
35
Model Strengths (1)


 Digest cannot be pre-computed by malware due to the
  random HTML elements
 Digest cannot be computed by malware without
  executing the digest computation function
     + Requires malware to implement / invoke Javascript engine
 Computation function can be extended to explicitly
  reference the randomly injected HTML elements through
  DOM functions
     + Requires the malware to implement / fake DOM
 Malware cannot dismiss test



36
Model Strengths (2)


 Does not depend on specific MitB configuration and the
  expected changes
     + Only depends on protected application page
     + Some configuration options should be available to restrict the
       parts of the page that are digested
         – Avoid elements produced by client side code

 Breaking the tie with attackers
     + Complexity of the computation process can be increased with
       small effort
     + Resulting changes to malware code are complex and
       painful, increasing its footprint




37
Overall Solution Strategy
Look at the Complete Picture


 Apply shape based tests and content based tests to
  identify infected client devices
 Interact with Infected Clients
   + Provide clear visual warnings
   + Contact customer offline
   + Apply business access policies
       – Example 1: Allow data extraction but deny transaction
       – Example 2: Limit transaction size
   + Automatically employ extra validation through side channels
       – Adaptive authentication
   + Keep a more comprehensive audit trail for the user / session
MitB is Only Part of the Landscape


 Identifying account takeover
     + Server side fraud detection
     + Device profiling and reputation
     + Advanced authentication
 Defeat Phishing Campaigns
     + Detect and takedown campaigns
     + Detect victims in real time




40
Flexible Deployment Framework


 Cannot change application code whenever capabilities
  change or threats morph
 Be able to protect legacy applications
 Create consistency across all applications and flexibility
  in choosing vendors




41
Summary
Summary


 Threat to consumer is constantly growing and is past the
  point where we can expect most of our consumers to
  avoid infection
 Consumer infection has become a business problem
 While providers should urge consumers to be prudent
  they MUST learn how to interact with infected
    Some car safety mechanisms are
  consumers and create a safe business environment for
  them regardless of the general threat
    already regulated. We can expect
    the same from business IT
    security
Summary (cont.)


 Enterprise IT is failing to properly tackle client based
  attacks within enterprise
 The growing number of so called “APT” attacks on
  organizations demonstrate the effect of “compromised
  insider”
 Failures stem from the same reason: try to avoid
  infection rather than learn to interact with infected
  clients




44
Questions




- CONFIDENTIAL -
Thank You




- CONFIDENTIAL -

Más contenido relacionado

La actualidad más candente

Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana
 

La actualidad más candente (7)

Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Internet Security Agent
Internet Security AgentInternet Security Agent
Internet Security Agent
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Destacado (8)

CSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserCSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browser
 
04 brute force
04 brute force04 brute force
04 brute force
 
Brute Force Attacks - Finding and Stopping them
Brute Force Attacks - Finding and Stopping themBrute Force Attacks - Finding and Stopping them
Brute Force Attacks - Finding and Stopping them
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 

Similar a Men in the Server Meet the Man in the Browser

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtable
eaiti
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 

Similar a Men in the Server Meet the Man in the Browser (20)

We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtable
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Novinky F5 pro rok 2018
Novinky F5 pro rok 2018Novinky F5 pro rok 2018
Novinky F5 pro rok 2018
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 

Más de Source Conference

Más de Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Men in the Server Meet the Man in the Browser

  • 1. Men in the Server Meet the Man in the Browser Amichai Shulman, CTO
  • 2. Agenda  Quick Introduction  Motivation  Problem Definition  Shape Based Tests  Content Based Tests  Overall Solution Strategy  Summary 2
  • 4. Imperva Overview Our mission. Protect the data that drives business Our market segment. Enterprise Data Security Our global business. • Public Company, Founded in 2002; • Global operations; HQ in Redwood Shores, CA • 350+ employees • Customers in 50+ countries Our customers. 1,300+ direct; Thousands cloud-based • 4 of the top 5 global financial data service firms • 4 of the top 5 global telecommunications firms • 4 of the top 5 global computer hardware companies • 3 of the top 5 US commercial banks • 150+ government agencies and departments
  • 5. Today’s Presenter Amichai Shulman – CTO Imperva  Speaker at Industry Events + RSA, Sybase Techwave, Info Security UK, Black Hat  Lecturer on Info Security + Technion - Israel Institute of Technology  Former security consultant to banks & financial services firms  Leads the Application Defense Center (ADC) + Discovered over 20 commercial application vulnerabilities – Credited by Oracle, MS-SQL, IBM and others Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
  • 7. Client Side Attacks - Scope of Problem (1) Major Attack Vectors  Browser code + On decline over past 3 years + Expected to rise over next 2 years  Browser plug-ins (Java, Flash, PDF, Me dia Player etc.)  OS libraries (graphics rendering)
  • 8. Client Side Attacks - Scope of Problem (2) 2010 Vulnerability Figures  Client side  Server side + 77 IE + Only 36 vulnerabilities vulnerabilites, 106 across IIS, Apache Firefox and Tomcat vulnerabilities, 188 Chrome vulnerabilities + 73 Adobe Flash, 9 Adobe Reader related vulnerabilities + 72 Various ActiveX related vulnerabilities 8
  • 9. Client Side Attacks - Scope of Problem (3) Malware Distribution Methods  Drive-By-Download / Malvertizing  Phishing, “Spear Phishing”  Torrent and P2P  Physical
  • 10. Client Side Attacks - Scope of Problem (4) 2009 / 2010 Attack Figures  A 2010 report by Kaspersky + ~600M attempts reported to KSN, more than 5 times increase over 2009  Number of Zeus infected computers estimated at 10M  Rustock spanned 1M computers  40K new infections a day (with some being cleaned up) Consumers cannot be expected to cope with the technical problem on their own
  • 11. From Consumer Attack to a Business Problem  The threat to consumers is constantly growing + Number of vulnerabilities + Number of attacks + Types of attacks + Sophistication  Usage is expanding beyond banking and popular retail applications  We are passed the point of no return + Cannot expect average consumers to avoid infection and mitigate attacks alone + We cannot deny service to infected consumers + We cannot let the consumer bear the consequences of a compromise
  • 12. From Consumer Attack to a Business Problem  Potential consequences (of failing to do so): + Reduced on boarding rate + Reduced activity + Increased refunds + Increased insurance rates Consumer facing malware threatens online commerce* Forrester Feb 2011: Malware And Trojans And Bots, Oh My!
  • 13. From Consumer Attack to a Business Problem  Car User Safety  Online User Safety
  • 15. Client Side Trouble – Types of Interaction  Key loggers + No interaction between malware and application + Offline interaction between attacker and application using stolen credentials  Phishing + Some interaction between browser and actual application during attack – Could be used for detection of some Phishing campaigns + Offline interaction between attacker and application using stolen credentials  Man in the Browser + Extensive interaction between malware and application during attack + Offline interaction between attacker and application using stolen credentials
  • 16. Man in the Browser Attacks  Attacker code running in context of victim’s browser  AKA Proxy Trojan  Original motivation + No need to attack infrastructure (DNS, tap into router, etc.) + Defeat SSL  Additional benefits + Access to local resources + Access to application session data  Prominent Actors + ZeuS, Gozi, URLZone, Sinowal, Limbo and SpyEye + Silentbanker 16
  • 17. MitB Attacks - The Evolution of Proxy Trojans Key Record Inject Manipulate logger HTML HTML and inject data elements transactions 17
  • 18. MitB Attacks - Proxy Trojans in Action Before After 18
  • 19. MitB Attacks - Proxy Trojans in Action Before After 19
  • 20. MitB Attacks - Proxy Trojans in Action Before After 20
  • 21. MitB Attacks - Proxy Trojans in Action Before After 21
  • 22. MitB Attacks - Proxy Trojans in Action Before After 22
  • 23. Proxy Trojan Architecture Web Application Client Machine 23
  • 24. Proxy Trojan Architecture Drop Server Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Tamper Request 24
  • 26. An Observation  Clean  Infected Trojan Likes to Tamper Plain Traffic
  • 27. Typical Changes by Trojan  Encoding related headers + Enforce use of traffic that is easily tampered by the Trojan + Avoid HTTP/1.1 connections, compressed data  Client type identification + Ensure identification by drop server and other attacker controlled components  Additional parameters + Extra data provided by an unfortunate victim + Could represent client identification for attacker controlled components  Parameter order + Expected from fake transactions 27
  • 28. Shape Based Tests  The application (or a device protecting the application) inspects the shape of incoming messages for changes typical to Trojans  If a Trojan pattern is detect mark the client (IP address / session / request) as “infected” 28
  • 29. Shape Based Tests in Action Drop Server Apply Shape Tests Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Apply Shape Tests Tamper Request 29
  • 30. Challenges – Tracking Trojan Discrepancies  Each Trojan may  Need to keep track of display a different Trojans change  Create a framework  Changes may be for shape based rules reflected in specific  Create a framework request types for constructing shape tests 30
  • 31. Challenges – Avoiding False Positives  Some real client HTTP/1.1 200 OK . devices do not . . support (or choose Content-Encoding: gzip not to support) Refresh: 2;url=infection_test.html?infected=no HTTP/1.1 or <html> ...........V*//W...Qzi...I...z...J:`.......T$......d.y.%@.^f.R,...( <head> ..y.:.J....9.V......%%...JV.J~.a...!..~@.Dqbkc...%6.... compressed data <script>window.navigate('infection_test.html?inf ected=yes')</script>  Engage the browser </head> <body></body> in a challenge </html> response protocol 31
  • 33. Content Based Tests  Current malware tampers HTML at the network layer (before it is interpreted by browser) + This is due to simplicity and robustness considerations  Use client side code to verify integrity of HTML page content in coordination with the server  Some solutions try to “provoke” the MitB into making changes. Then compare the HTML content to known Trojan behaviors + This can be avoided by careful configuration of the MitB + Requires constant chase after MitB configuration files – Construct an up-to-date database of “known behaviors”
  • 34. Client / Server Content Verification  Server computes a digest of the delivered HTML page + Random (invisible) elements are injected into the page before computation  Server appends a page digest computation function to the HTML page + Computation function code includes a random salt  When page is loaded into the browser, the computation function is invoked, computes the digest and sends it to the server for verification  If the browser does not send back a digest then infection is assumed 34
  • 35. Content Based Tests in Action Drop Server Compute Digest and Inject Digest Computation Function Inject Fake Transaction Extract Data Tamper Page Web Application Client Machine Compare Digests Tamper Request Compute Digest 35
  • 36. Model Strengths (1)  Digest cannot be pre-computed by malware due to the random HTML elements  Digest cannot be computed by malware without executing the digest computation function + Requires malware to implement / invoke Javascript engine  Computation function can be extended to explicitly reference the randomly injected HTML elements through DOM functions + Requires the malware to implement / fake DOM  Malware cannot dismiss test 36
  • 37. Model Strengths (2)  Does not depend on specific MitB configuration and the expected changes + Only depends on protected application page + Some configuration options should be available to restrict the parts of the page that are digested – Avoid elements produced by client side code  Breaking the tie with attackers + Complexity of the computation process can be increased with small effort + Resulting changes to malware code are complex and painful, increasing its footprint 37
  • 39. Look at the Complete Picture  Apply shape based tests and content based tests to identify infected client devices  Interact with Infected Clients + Provide clear visual warnings + Contact customer offline + Apply business access policies – Example 1: Allow data extraction but deny transaction – Example 2: Limit transaction size + Automatically employ extra validation through side channels – Adaptive authentication + Keep a more comprehensive audit trail for the user / session
  • 40. MitB is Only Part of the Landscape  Identifying account takeover + Server side fraud detection + Device profiling and reputation + Advanced authentication  Defeat Phishing Campaigns + Detect and takedown campaigns + Detect victims in real time 40
  • 41. Flexible Deployment Framework  Cannot change application code whenever capabilities change or threats morph  Be able to protect legacy applications  Create consistency across all applications and flexibility in choosing vendors 41
  • 43. Summary  Threat to consumer is constantly growing and is past the point where we can expect most of our consumers to avoid infection  Consumer infection has become a business problem  While providers should urge consumers to be prudent they MUST learn how to interact with infected Some car safety mechanisms are consumers and create a safe business environment for them regardless of the general threat already regulated. We can expect the same from business IT security
  • 44. Summary (cont.)  Enterprise IT is failing to properly tackle client based attacks within enterprise  The growing number of so called “APT” attacks on organizations demonstrate the effect of “compromised insider”  Failures stem from the same reason: try to avoid infection rather than learn to interact with infected clients 44

Notas del editor

  1. I use “Men” to describe enterprise IT people.
  2. Client side software is much more susceptible to “generic” attacks than server side. Less custom code Introduction of HTML 5.0 which takes a lot of plug-in functionality into browser code and new technologies that allow execution of native code in browser context are probably going to invoke a rise in browser code vulnerabilities- While the 10 IIS vulnerabilities are handled by professional IT staff, the 77 IE vulnerabilities are handled by my mother and my kids.
  3. 2010 Figures collected from the webServer side vulnerabilities are handled by top IT people (I chose pictures of 2011 CIO of the year).Client side vulnerabilities are handled by my kids and their grandmother.
  4. Mention my interview in CNN in November 2010Traditional methods such as AV updates, Search engine “warning signs” and consumer prudence are no longer a viable defense. This is not a technology issue but a human nature / skill issue.Mention the December 2010 press about Macy’s and Nordstrom being targeted. http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=228800040&amp;cid=RSSfeed_IWK_AllExpansion into other domain is reflected also in VDBIRCounting on consumers to avoid detection is like counting on drivers to avoid car crashes (hint hint)
  5. All these have an impact on the financial bottom line of organizations.
  6. We learned to expect Seat belt, air bags, ABS, ESP, energy absorbing chassis and more
  7. Attackers realized that it is easier to install an agent on the victim’s machine than to tap into communications channel in the InternetDiscuss the commonality of Zeus regardless of its age and tenure.
  8. Today they defeat two factor authentication and anti-CSRF
  9. Tamper the request to invoke a failed login Tamper the incoming page to include additional fields Intercept the outgoing response and send data to malicious server
  10. http://www.ffiec.gov/press/pr062811.htmhttp://www.ffiec.gov/pdf/Auth-ITS-Final%206-22-11%20(FFIEC%20Formated).pdf