CS计算机代考程序代写 Java SQL database javascript jquery Web Security SQL Injection, CSRF, XSS

Web Security SQL Injection, CSRF, XSS
ECEN 4133 Feb 11, 2021

Web Review | HTTP
GET / HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …




http://gmail.com/ says: Hi!
gmail.com
GET /img.png HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …
<89>PNG^M …

Web Review | Cookies
POST /login HTTP/1.1 Host: gmail.com
user=alice&pass=s3cre7
gmail.com
HTTP/1.1 200 OK
Server: gws
Set-Cookie: foo=“bar” Set-Cookie: token=“8kFmCe…”

GET / HTTP/1.1
Host: gmail.com
Cookie: foo=“bar”; token=“8k…”
Ah, it’s alice!

Web Review | AJAX (jQuery style)
HTTP/1.1 200 OK


http://gmail.com/ says:
gmail.com
function (data) { alert(data) });
{ new_msgs: 3}
GET / HTTP/1.1 Host: gmail.com
$.get(‘http://gmail.com/msgs.json’,
GET /msgs.json HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …
{ new_msgs: 3 }

Web Review | Same-Origin Policy (SOP)
(evil!) facebook.com
gmail.com
GET / HTTP/1.1 Host: facebook.com
HTTP/1.1 200 OK


$.get(‘http://gmail.com/msgs.json’, function (data) { alert(data); }
GET /msgs.json HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …
{ new_msgs: 3 }

Web Review | Same-Origin Policy (SOP)
facebook.com
?
GET / HTTP/1.1 Host: facebook.com
HTTP/1.1 200 OK


gmail.com

Web Review | Same-Origin Policy (SOP)
facebook.com
gmail.com
GET / HTTP/1.1 Host: facebook.com
HTTP/1.1 200 OK


GET /img.png HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …
<89>PNG^M …

Web Review | Same-Origin Policy (SOP)
facebook.com
?
GET / HTTP/1.1 Host: facebook.com
HTTP/1.1 200 OK

Web Review | Same-Origin Policy (SOP)
http://gmail.com/ says: {
$.get(‘http://gmail.com/chat.json’,
new_msgs:{ from:“Bob”,
function (data) { alert(data); })
msg: “Hi!”}}
gmail.com
GET /chat.json HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK
...
{ new_msg:{ from:“Bob”, msg: “Hi!”}}

Cross-site Request Forgery (CSRF)
 Suppose you log in to bank.com
fde874 = bob
bank.com
POST /login?user=bob&pass=abc123 HTTP/1.1 Host: bank.com
HTTP/1.1 200 OK Set-Cookie: login=fde874 ....

Cross-site Request Forgery (CSRF)
fde874 = bob
bank.com
GET /account HTTP/1.1 Host: bank.com Cookie: login=fde874
HTTP/1.1 200 OK ....
$378.42

Cross-site Request Forgery (CSRF)
Click me!!!
http://bank.com/transfer?to=badguy&amt=100
fde874 = bob
bank.com
GET /transfer?to=badguy&amt=100 HTTP/1.1 Host: bank.com
Cookie: login=fde874
HTTP/1.1 200 OK
....
Transfer complete: -$100.00

CSRF Defenses
 Need to “authenticate” each user action originates from our site
 One way: each “action” gets a token associated with it
 On a new action (page), verify the token is present and correct
 Attacker can’t find token for another user,
and thus can’t make actions on the user’s behalf

CSRF Defenses
Pay $25 to Joe: http://bank.com/transfer?to=joe&amt=25&token=8d64
fde874 = bob
bank.com
HTTP/1.1 200 OK Set-Cookie: token=8d64 ....
GET /transfer?to=joe&amt=25&token=8d64 HTTP/1.1 Host: bank.com
Cookie: login=fde874&token=8d64
HTTP/1.1 200 OK
....
Transfer complete: -$25.00

Cross-Site Scripting (XSS)
Bob HTTP/1.1
HTTP/1.1 200 OK ...
Hello, Bob!

Cross-Site Scripting (XSS)
alert(‘XSS’)
GET /?user= HTTP/1.1
HTTP/1.1 200 OK
...
Hello, !

Web Review | Same-Origin Policy (SOP)
(evil!) facebook.com
gmail.com
GET / HTTP/1.1 Host: facebook.com
HTTP/1.1 200 OK
...

GET /msgs.json HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK ...
{ new_msgs: 3 }

Cross-Site Scripting (XSS) Attack
(evil!) facebook.com
gmail.com
GET / HTTP/1.1 Host: facebook.com
$.get(‘http://gmail.com/ msgs.json’, function (data)
{ alert(data); })
HTTP/1.1 200 OK
...

GET /?user= HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK

Hello,

Cross-Site Scripting (XSS) Attack
(evil!) facebook.com
gmail.com
GET / HTTP/1.1 Host: facebook.com
h$t.tgpe:t/(/‘ghmttapil:./c/goma/ils.cayosm: / msgs.json’, function (data)
{ new{_amlesrgts(:d3at}a); })
HTTP/1.1 200 OK


GET /msgs.json HTTP/1.1 Host: gmail.com
HTTP/1.1 200 OK …
{ new_msgs: 3 }

Types of XSS
 Reflected XSS
 http://vulnerable.com/?q=
 Stored XSS
 Attacker stores XSS in database
POST /message HTTP/1.1
Host: vulnerable.com
to=victim&message=
 Victim browses to http://vulnerable.com/inbox …
You have 1 new message:
From: attacker
Message:

Cross-Site Scripting (XSS) Attack
 What can an attacker do with an XSS?
 Exfiltrate data back to attacker (HTTP POST)
 Cookies,CSRFtokens,privateinformation
 Perform actions on victims behalf  AnyCSRFattacks!
 Set cookies to attacker’s choosing

XSS Defenses
 Make sure data gets shown as data, not executed as code!
 Escape special characters
 Which ones? Depends what context your $data is presented
 Inside an HTML document?

Leave a Reply

Your email address will not be published. Required fields are marked *