+ All Categories
Home > Documents > S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Date post: 18-Dec-2015
Category:
Upload: gervase-douglas
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
17
DRIVE-BY PHARMING S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le
Transcript
Page 1: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

DRIVE-BY PHARMING

S. Stamm, Z. Ramzan, and M. JakobssonPresented by Anh Le

Page 2: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

Authors

Sid Stamm- Indiana University- Google Intern

Dr. Zulfikar Ramzan- Technical Director ofSymantec Security

Prof. Markus Jacobsson- Indiana University- Principal Scientist at Palo Alto RC

Page 3: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

Outline

1. Introduction

2. Preliminaries and Previous Work

3. Drive-By Pharming

4. Demo

5. New Attacks and Recent Events

6. Conclusion and Discussion

Page 4: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

1. Introduction Motivation:

Total control of home broadband routers○ Phishing (by changing DNS setting)○ Botnets (by changing firmware)

How: Attacker sets up an “evil” webpage Victim visits the evil webpage Victim’s home router is compromised No physical proximity required

Enablers: JavaScript-enabled web browsers Default password management of the routers

Page 5: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

2a. Preliminaries

DNS:Domain Name System

What’s IP of yahoo.com?

yahoo.com’s IP is 206.190.60.37

ClientDNS server(home router)

Page 6: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

2a. Preliminaries (cont.)

Phishing:A type of social engineering attack to obtain

access credentials

Pharming:An attack aiming to redirect a website's

traffic to another bogus website

Page 7: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

2b. Previous Work

InternetInternet

Detecting … … Your internal subnet is10.0.0.0/24!

1. Internal Net Discovery [Kindermann 2003]• Java Applet

2. Host Scanning [Grossman 2006, SPI Labs 2006]• Java Script

• Fingerprint router using default password and image name

Detecting … … You have a Linksys router, and its IP is 10.0.0.1!

Page 8: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

Outline

1. Introduction

2. Preliminaries and Previous Work

3. Drive-By Pharming

4. Demo

5. New Attacks and Recent Events

6. Conclusion and Discussion

Page 9: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

3. Drive-By Pharming

InternetInternet

DNS SettingChanged!

Page 10: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

3. Drive-By Pharming

How is it possible?HTTP Get Configuration

Off-site script inclusion

How about password-protected?

http://10.0.0.1/apply.cgi?dns=new-dns-server.com

<script src=“http://10.0.0.1/apply.cgi?dns=evil.com”></script>

<script src=“http://usr:[email protected]/ apply.cgi?dns=evil.com”></script>

Page 11: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

3. Drive-By Pharming (cont.)

Assumptions:1. JavaScript-Enabled

Web Browser

2. Default Password Management

Vulnerable Routers: Netgear WGR614 D-Link DI-524 Linksys WRT54G Cisco 806, 826, … …

47.5%

47.5%

5.0%

American Web Users

JS + Password Password JS + Default Password No JS

Page 12: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

3. Drive-By Pharming (cont.) Verizon

[Modem + Router]MI424-WR

admin:admin

Page 13: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

4. Demo

Page 14: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

Outline

1. Introduction

2. Preliminaries and Previous Work

3. Drive-By Pharming

4. Demo

5. New Attacks and Recent Events

6. Conclusion and Discussion

Page 15: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

5. New Attacks and Recent Events New Attacks:

Growing Zombies/Botnets○ By installing evil firmware

Viral Spread○ Router auto-recruits routers

Recent Events: Kaminsky DNS Vulnerability (July 2008)

○ cache poisoning attacks on any nameserver! Router Botnets (March 2009!)

Page 16: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009

5. Conclusion and Discussion

Routers with default password management are easily compromised

Browsers as conduits of attacks to internal network

Army of router botnets

Page 17: S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.

Anh Le - UC Irvine - 2009


Recommended