|
CSRF attacks and forensic analysis |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Cross-site request forgery CSRF attacks exhibit an oft misunderstood yet immediate impact on the victim not to mention the organization they work for whose browser has just performed actions they did not intend, on behalf of the attacker. Consider the critical infrastructure operator performing administrative actions via poorly coded web applications, who unknowingly falls victim to a spear phishing attack. The result is a CSRF-born attack utilized to create an administrative account on the vulnerable platform, granting the attacker complete control over a resource that might manage the likes of a nuclear power plant or a dam pick your poison . Enough of an impact statement for you There's another impact, generally less considered but no less important, resulting from CSRF attacks they occur as attributable to the known good user, and in the context of an accepted browser session. Thus, how is an investigator to fulfill her analytical duties once and if CSRF is deemed to be the likely attack vector I maintain two views relevant to this question. The first is obvious. Vendors and developers should produce web applications that are not susceptible to CSRF attacks. Further, organizations, particularly those managing critical infrastructure and data with high business impact or personally identifiable information PII , must conduct due diligence to ensure that products used to provide their service must be securely developed. The second view places the responsibility squarely on the same organization to 1 capture verbose and detailed web logs especially the referrer 2 stored and retained browser histories and or internet proxy logs for administrators who use hardened, monitored workstations, ideally with little or no internet access Strong, clarifying policies and procedures are recommended to ensure both 1 2 are successful efforts. DETAILED DISCUSSION Web logs Following is an attempt to clarify the benefits of verbose logging on web servers as pertinent to CSRF attack analysis, particularly where potentially vulnerable web applications all are served. The example is supported by the correlative browser history. I've anonymized all examples to protect the interests of applications that are still pending repair. A known good request for an web application administrative function as seen in Apache logs might appear as seen in Figure 1. Figure 1 As expected, the referrer is http 192.168.248.102 victimApp page admin, a local host making a request via the appropriate functionality provided by the application as expected. However, if an administrator has fallen victim to a spear phishing attempt intended to perform the same function via a CSRF attack, the log entry might appear as seen in Figure 2. Figure 2 In Figure 2, although the source IP is the same as the known good request seen in Figure 1, it's clear that the request originated from an unexpected location, specifically http badguy.com poc postCSRFvictimApp.html as seen in the referrer field. Most attackers won't be so accommodating as to name their attack script something like postCSRFvictimApp.html, but the GET POST should still stand out via the referrer field. Browser history or proxy logs Assuming time stamp matching and enforced browser history retention or proxy logging major assumptions, I know , the log entries above can also be correlated. Consider the Firefox history summary seen in Figure 3. Figure 3 The sequence of events shows the browser having made a request to badguy.com followed by the addition of a new user via the vulnerable web applications add user administrative function. RECOMMENDATIONS 1 Enable the appropriate logging levels and format, and ensure that the referrer field is always captured. For Apache servers consider the following log format LogFormat pourcentsh pourcentsl pourcentsu pourcentst pourcentsr pourcentss pourcentsb pourcents Referer i pourcents User-agent i combined CustomLog log access_log combined For IIS servers be sure to enable cs Referer logging via IIS Manager. Please note that it is not enabled by default in IIS and that W3C Extended Log File Format is required. 2 Retain and monitor browser histories and or internet proxy logs for administrators who conduct high impact administrative duties via web applications. Ideally, said administrators should use hardened, monitored workstations, with little or no internet access. 3 Provide enforced policies and procedures to ensure that 1 2 are undertaken successfully. Feedback welcome, as always, via comments or email. Cheers. del.icio.us digg Submit to Slashdot Please support the Open Security Foundation OSVDB
Les mots clés de la revue de presse pour cet article : forensic Les videos sur SecuObs pour les mots clés : forensic Les mots clés pour les articles publiés sur SecuObs : forensic Les éléments de la revue Twitter pour les mots clé : forensic
Les derniers articles du site "HolisticInfoSec.org" :
- toolsmith ZeroAccess analysis with OSForensics - toolsmith Registry Decoder - Tool review NetworkMiner Professional 1.2 - toolsmith OWASP ZAP - Zed Attack Proxy - Presenting OWASP Top 10 Tools Tactics at ISSA International - toolsmith Log Analysis with Highlighter - toolsmith Memory Analysis with DumpIt and Volatility - Phorum Phixes Phast - toolsmith PacketFence - Open Source NAC - Mark Russinovich presenting at ISSA Puget Sound
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|