+ All Categories
Home > Documents > 52146446-web .ppt

52146446-web .ppt

Date post: 12-Aug-2015
Category:
Upload: thanniru-venkatesh
View: 17 times
Download: 2 times
Share this document with a friend
Description:
this ppt describes the web spoofing and how attacker spoofed your data on spoof
Popular Tags:
19
PRESENTED BY:
Transcript
Page 1: 52146446-web .ppt

PRESENTED BY:

Page 2: 52146446-web .ppt

WHAT ISWHAT IS SPOOFING ?? SPOOFING ??

Spoofing means, pretending to be something, you are not.

Page 3: 52146446-web .ppt

WEB SPOOFINGWEB SPOOFING• Online Fraud• Attacker create a

“shadow copy” of the entire world wide web to get the personal

information about the user, such as passwords or account numbers etc.

Page 4: 52146446-web .ppt

What is Web SpoofingWhat is Web Spoofing• Pretending to be a legitimate site• Attacker creates convincing but false copy of the

site• Stealing personal information such as login ID,

password, credit card, bank account, and much more. aka Phishing attack

• False Web looks and feels like the real one

• Attacker controls the false web by surveillance

• Modifying integrity of the data from the victims

Page 5: 52146446-web .ppt
Page 6: 52146446-web .ppt

STARTING THE STARTING THE ATTACKATTACK

•The attacker must somehow lure the victim into the attacker’s false web.

• An attacker could put a link to false Web onto popular Web page.

• If the victim is using Web-enabled email, the attacker could email the victim a pointer to false Web.

Page 7: 52146446-web .ppt

Have you ever received an e-mail that looked

like this?From:From: Bank of AmericaBank of America

To: John DoeTo: John DoeSubject: Your Online Banking Account is InactiveSubject: Your Online Banking Account is Inactive

Your Online Banking Account isYour Online Banking Account isInnactiveInnactive

We closed your online access for security reasons.We closed your online access for security reasons.

Click here to access your accountClick here to access your accountWe must verify your account information. We must verify your account information.

Bank of America, N.A. Member FDIC. Equal Housing Lender Bank of America, N.A. Member FDIC. Equal Housing Lender © 2004 Bank of America Corporation. All rights reserved. © 2004 Bank of America Corporation. All rights reserved.

Page 8: 52146446-web .ppt

CONSEQUENCESCONSEQUENCES• Surveillance – the attacker can passively

watch the traffic, recording which pages the victim visits and the contacts of those pages. (This allows the attacker to observe any account numbers or passwords the victim enters.)

• Tampering – the attacker can modify any of the data traveling in either direction between the victim and the Web. (The attacker would change the product number, quantity or ship to address.)

Page 9: 52146446-web .ppt

HOW THE ATTACK HOW THE ATTACK WORKS ??WORKS ??

URL REWRITING

FORMS “SECURE” CONNECTION

Page 10: 52146446-web .ppt

URL RewritingURL Rewriting• The attacker’s first trick is to rewrite all of the URLs

on some web page so that they point to the attacker’s server rather than the real server. Assuming the attacker’s server is on the machine www.attacker.org, the attacker rewrites a URL by adding http://www.attacker.org to the front of the URL. For example, http://home.netscape.com becomes http://www.attacker.org/http://home.netscape.com.

• Once the attacker’s server has fetched the real document needed to satisfy the request, the attacker rewrites all of the URLs. in the document into the same special form. Then the attacker’s server provides the rewritten page to the victim’s browser.

• If the victim fallows a link on the new page, the victim remains trapped in the attacker’s false web.

Page 11: 52146446-web .ppt

C0NTINUED…………C0NTINUED…………

Page 12: 52146446-web .ppt

FormsForms• When the victim submits a form,

the submitted data goes to the attacker’s server. The attacker’s server can observe and even modify the submitted data, doing whatever malicious editing desired, before passing it on to the real server.

Page 13: 52146446-web .ppt

““Secure” Secure” ConnectionsConnections

• The victim’s browser says it has secure connection because it does have one. Unfortunately the secure connection I to the www.attacker.org and not the place the victim is think it is. The victim’s browser think everything is fine: it was told to access a URL at www.attacker.org. the secure connection indicator only gives the victim a false sense of security.

Page 14: 52146446-web .ppt

Signs that you may have been a victimSigns that you may have been a victim

• If an unexpected error occurs, you may be a victim of web spoofing (sorry) (This relates to Dr. Burmester's example of the fake ATM's)

• If you have to click submit buttons repeatedly. (class example)

• If you have to enter your password repeatedly (class example)

• If there is any redirection to other webpages.

Page 15: 52146446-web .ppt

How to detect a spoofed webpage How to detect a spoofed webpage • URL (this is the easiest way to detect the

attack!) – Triple check the spelling of the URL – Look for small differences such as a hyphen (-) or an

underscore (e.g. suntrust.com vs. sun-trust.com)

• Mouse over message (careful: this can be spoofed too!)

• Beware of pages that use server scripting such as php these tools make it easy to obtain your information.

• Beware of javascripting as well. • Beware of longer than average load times.

Page 16: 52146446-web .ppt

• Don’t take anything for granted. • Do not click on links you receive in an e-mail

message asking for sensitive personal, financial or account information.

• Call the company directly to confirm requests for updating or verifying personal or account information.

• Do not share your ID’s or pass codes with anyone.

• Look for secure connections on Web sites.• Always sign off Web sites or secure areas of

Web Sites.• When your computer is not in use, shut it

down or disconnect it from the Internet.

Page 17: 52146446-web .ppt

• disable JavaScript in your browser so the attacker will be unable to hide the evidence of

• the attack;

• make sure your browser’s location line is always visible;

• pay attention to the URLs displayed on your browser’s location line, making sure they always point to the server you think you’re connected to.

Page 18: 52146446-web .ppt

CONCLUSIONCONCLUSION No doubt, we are

living in the 21st century and internet has become our need. Although there are many secure connections on the web, but still its not guaranteed that our personal data is secure. So a small mistake can create a big pain.

Page 19: 52146446-web .ppt

Recommended