90 likes | 258 Views
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM adli@kict.iiu.edu.my http://kict.iiu.edu.my/adli. The Plan. Network Based Attacks Client-based Applications Attacks Potential Solutions Conclusion. Network Based Attacks.
E N D
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM adli@kict.iiu.edu.my http://kict.iiu.edu.my/adli
The Plan • Network Based Attacks • Client-based Applications Attacks • Potential Solutions • Conclusion
Network Based Attacks • Attacks that are carried out 'remotely' • Internet or another machine on the LAN • Most literature cover attacking applications that are server based • Always listening on specific port numbers • i.e. Web, mail, ftp, etc • Attacks are essentially in the form of buffer overflows or (that can trigger) DoS
Network Based Attacks (2) • Clients-based applications attacks are increasingly popular • Exploit • Web Browsers • Instant Messengers • Mail Clients
Examples in 2005 • Yahoo! Messenger ymsgr URI Arbitrary Command Execution • Yahoo! Messenger Offline Mode Status Remote Overflow • Gaim Away Message Processing Remote Overflow • Mozilla Firefox IFRAME Width Overflow • Opera Command Line URL Shell Command Injection • Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
Typical Scenario • User use vulnerable browser to surf net • Firewall allows this • User clicks on site with malicious code • Browser execute code and (maybe) payload • Payload may contain worm that leads to other problems, cause DoS etc
The Issues (1) • Attack techniques are more or less the same – buffer overflow, just different target • Typically use • Some form of social engineering • User click on the URL • Need more than basic perimeter protection • Firewall and IDS • Policy enforcement • How do you make sure that all of the 5000 Pcs in your network uses the updated version of Browser XYZ
Potential Solutions • IDS / IPS • What if malicious attacker is on the same LAN ? • Patch management • Large user base? • Different types of software , tied to policy • OS level • Stack protection in the case of buffer overflow based attacks • What if network is open to all (hotspot) • Antivirus
Conclusion • Attacks don't just target server based programs • Client-based applications are just as vulnerable and targeted by attackers • Complexity in defending the user en-masse • Multiple approaches need to be used to defend the network successfully.