210 likes | 350 Views
TEL 283. DoS on Competitor Web Site. The approach. Phoenix has a “referral” from “Mr. Dobbs” Dobbs has threatened his girlfriend in the past Dobbs sent a “client” to Phoenix with a reminder about his girlfriend Client Works for a computer parts company $9B annual revenues
E N D
TEL 283 DoS on Competitor Web Site
The approach • Phoenix has a “referral” from “Mr. Dobbs” • Dobbs has threatened his girlfriend in the past • Dobbs sent a “client” to Phoenix with a reminder about his girlfriend • Client • Works for a computer parts company • $9B annual revenues • Asking that a whistleblower organization’s web site (www.thetruthusa.org) be down/inaccessible for a single day • Organization intends to splash damaging information on a specific day (day before the earnings statement release) • Client does not wish to have the company’s stock prices fall just prior to the earnings release
www.thetruth.org • Recon • Shows the site to be amateurish • Google search indicates that HS students were allowed to get experience in designing and putting up the website • Phoenix hopes for poor design, maintenance/security and lower bandwidth
The Plan • Find an unprotected wireless network to perform the hack • Use an anonymizer • Make a DDoS attack using Freak88 DDoS tool • Test the DDoS tool in lab • Infect unprotected hosts with the Server.exe Trojan Horse • Take control of the infected hosts and launch the DDoS on the target site
Freak88 • Download contains • Clienttrinno.exe • Server.exe • Msbvm50.dll • Client controls the boxes which have the Trojan server running on them • Servers will issue to pings • These boxes are referred to as “zombies” • The more zombies in the field attacking the victim, the better for the attacker!
History • Shift from email phishing attacks to web based attacks • Email filters are becoming more effective • Web based attacks are more popular now because so much is being put into “business rich” web sites and browsers fail to handle such content • Their primary function is to render web pages • SQL injection • Cross site scripting • Inline frames • CSS • Ping attacks might be filtered • Accomplish the same effect using a web based attack
The exploit • Attack #1: Test • Attack #2: The one that worked • Gain access to Pawn Web site • Lab test the hack • Modify the Pawn site
Test • Phoenix • Sets up a victim machine • Starts up Wireshark filtering ICMP traffic • Fires up a server zombie on a machine • Fires up the client software • Dialog box allows attacker to “stack” the IP’s and ports of the zombie machines • Indicates the IP of the victim • Buttons: • Connect, Disconnect, and “Takemout” • Wireshark confirms ton of ICMP traffic
Test • Just to be sure… • Phoenix attempts to ping the webpage at www.thetruthusa.org • Gets Timed Out results • It turns out that the students have set up a PIX firewall to prevent pings to the web server!
Alternate attack • Inline frames • If small, but many, inline frames can be installed on a web page • Each frame can load the web page from a site • FORCE MULTIPLIER! • If you can constantly refresh each frame… better still
Alternate attack • The trick is now to find a web site with lots of bandwidth and lots of traffic • Social engineer the web design company • Phoenix needs write access to the server • Modify the home page • Add inline frames calling the target’s homepage • If 10 frames are added, every time a user brings up the unknowing accomplice’s page, 10 HTML “get” requests are issued against the victime • If you “refresh” the inline request every 5 seconds…
Social Engineering • Phoenix poses as a potential client • Speaks with developers and requests a demonstration • Representative shows Phoenix how quickly a page can be added • In doing so, the rep refers to a 3-ring binder for the information on sites (credentials, etc) • Phoenix notes the location of the binder • Phoenix bribes the cleaner to photocopy the contents of the 3-ring binder
Inline frames <iframe src=http://www.thetruthusa.org width = 0 height=0> </iframe> • Refreshing every 5 seconds • Add a meta tag to the web page <meta http-equiv=“refresh” content=“5”>
Modify the Pawn Site • Phoenix downloads the Pawn’s web page • Inserts the inline frames and the meta tag • FTP’s the altered page to the Pawn’s server
Results • DDoS against the victim • How long? • Depends… • If traffic is examined, requests for the page are coming from all over • If IP is changed, the requests are made for URL and not IP… no effect! • Someone would have to examine the pawn’s HTML within their page to spot the inline frames • If reported to the pawn site, they might not notify the target that they were the unwitting accomplice • Once the pawn replaces the modified page with the original • Cached pages still might exist in browsers around the world…
Other possibilities • Phoenix could have inserted a source pointer to a Trojan instead of the target’s URL • If the pointer is to a keylogger, the pawn site could be made to appear as if they are infecting computers around the world • What is the pawn company’s liability in this case?
Countermeasures • Prevent disclosure of information via passive means • Configure DNS not to reveal information (via registrar) • Configure web server settings • Don’t “advertise” information about the site or developers that nobody requires • Even if removed from the web, historical pages might exist • NETCRAFT might reveal information regardless…
Countermeasures • ICMP • Disable entry of Ping packets into the network from outside • If required, then script a “block” from IP’s in the event that pings exceed a given number in a time period • Might not be that effective in a DDoS attack…
Countermeasures • Blocking DDoS attacks via web • Create customize stack • Costly (development and maintenance) • Reserved for highly secured environments • Rate limiting • Bandwidth • Connection limits • Black hole filtering • Send suspicious traffic to a nonexistent interface • These are all counter to the reason the company site is up in the first place…
Countermeasures for web site modification • Review the web site hosting company’s policies and security statements • Your company should authorize all changes • One time passwords, maintained by your company • Forces the developer to contact you for each modification
Countermeasures for employee compromise • Physical access to information • Paper format? • Put onto encrypted electronic format, and then on a locked down workstation, which is physically protected • Separation of duty • Principle of least privilege