Journal Name : INTERNATIONAL JOURNAL FOR RESEARCH IN APPLIED SCIENCE AND ENGINEERING TECHNOLOGY (IJRASET)
ISSN : 2321-9653
Vol. 2 Issue II, February 2014
By Navneet Kumar Vishwas
Abstract: Website and its related technology started to play a vital role in our life. Infect it has become most important representative of business and provide significant improvements in business operations, banking system, education system, communication system and in the entire human life. Websites has not only brought the world closer together, but it has allowed the world's to access any part of the world in easiest way. It’s provide a smooth and easiest platform through which our prospective client or customer also interacts with our business and huge number of sales happen through this only. But good and bad things always fly together. Same is with websites also. Developers always try to develop best websites and hackers try to destroy it or damage vital information. So, there is a need of extraordinary attention towards protection of websites, especially if we are transferring vital information through it. There is lot of loopholes or we can say that unknown doors by which hackers try to enter in websites and try to damage it. Such as SQL injection, cross site scripting, session management, click jacking, dns caching, symbolic linking etc. So, through this article we want to describe some loopholes by which hackers try to enter in any websites or hacked it. Hence we suggest all website owner to take almost care for making their website as secured as possible. Always tries to secure your database, validate all inputs, encrypt all user name and passwords, end sessions properly and close all possible doors to keep hackers out.
ISSN : 2321-9653
Vol. 2 Issue II, February 2014
By Navneet Kumar Vishwas
Abstract: Website and its related technology started to play a vital role in our life. Infect it has become most important representative of business and provide significant improvements in business operations, banking system, education system, communication system and in the entire human life. Websites has not only brought the world closer together, but it has allowed the world's to access any part of the world in easiest way. It’s provide a smooth and easiest platform through which our prospective client or customer also interacts with our business and huge number of sales happen through this only. But good and bad things always fly together. Same is with websites also. Developers always try to develop best websites and hackers try to destroy it or damage vital information. So, there is a need of extraordinary attention towards protection of websites, especially if we are transferring vital information through it. There is lot of loopholes or we can say that unknown doors by which hackers try to enter in websites and try to damage it. Such as SQL injection, cross site scripting, session management, click jacking, dns caching, symbolic linking etc. So, through this article we want to describe some loopholes by which hackers try to enter in any websites or hacked it. Hence we suggest all website owner to take almost care for making their website as secured as possible. Always tries to secure your database, validate all inputs, encrypt all user name and passwords, end sessions properly and close all possible doors to keep hackers out.
Keywords: website protection, website safety, is your website protected, hacker’s tools, website hacking technique.
Fig.5- Social Engineering attack cycle [10]
· Installed software updates and patches of operating system regularly.
· Actually hackers see the weakness of system and take advantages so, always use recent version of software’s.
· Make your database fully authenticated and validated.
· Always close your session after working with website or try to delete history from web browser.
· Never click on seemingly innocuous web pages which save you from Click jacking Attacks.
· See path of the pages before clicking on symbolic link.
· Update your browser also on regular basis.
· Make sure firewall must be installed on your pc and update it regularly.
· Personalize your firewall setting during the setup process which show how much data you want to allow into your system from internet.
· Change your password regularly.
· Always use proper antivirus and scan regularly your pc.
· Make sure anti-virus software updates automatically.
· Install anti-spyware programs onto your system.
· Delete emails from unknown sources.
· Network must be managed with appropriate firewall.
· Check your system software and make sure not any unknown software installed you pc.
· Make your pc password protected.
· Keep your operating system updated/patched. Set it to "auto update".
· Use anti-virus and anti-spyware software and keep them updated.
· Do not visit un-trusted websites or follow links provided by unknown or un-trusted sources.
· Secure your transactions. Look for the "lock" icon on the browser's status bar and be sure "https" appears in the website's address bar before making an online purchase. The "s" stands for "secure" and indicates that the communication with the webpage is encrypted.
· Be cautious about all communications you receive including those purported to be from "trusted entities" and be careful when clicking links contained within those messages.
· Do not respond to any unsolicited (spam) incoming e-mails.
· Do not open any attachments contained in suspicious emails.
· Do not respond to an email requesting personal information or that ask you to "verify your information" or to "confirm your user-id and password."
· Beware of emails that threaten any dire consequences should you not "verify your information".
· Do not enter personal information in a pop-up screen. Providing such information may compromise your identity and increase the odds of identity theft.
· Have separate passwords for work related and non-work related accounts.
· Be educated with modern technology.
[1] http://defencely.com/blog/10-popular-ways-hackers-hack-website/
[2]CiscoReview http://www.cisco.com/en/US/prod/collateral/con netw/ps5719/ps7314/prod_white_paper0900aecd80661ca6.html
[3] Microsoft.com http://www.microsoft.com/security/sir/
trategy/default.aspx#!cross_site_scripting
[4] http://defencely.com/blog/10-popular-ways-hackers-hack-website/
[5] http://www.microsoft.com/security/sir/trategy/default.aspx#!cross_site_scripting
[6] https://www.owasp.org/index.php/Man-in-the-middle_attack
[7] https://www.owasp.org/index.php/Top_10_2013-A2
Broken_Authentication_and_Session_Management
[8] http://en.wikipedia.org/wiki/Clickjacking
[9] http://hackingtech.in/clickjacking-attack-things-you-should-know/
[10] copyright 2002 Gartner G2
[11] http://en.wikipedia.org/wiki/Symbolic_link
[12] https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
[13] http://defencely.com/blog/10-popular-ways-hackers-hack-website/
I. INTRODUCTION
Website and its
related technology started to play a vital role in our life and became most
important thing. Infect it has become most important representative of business
and provide significant improvements in business operations, banking system,
education system, communication system and in the entire human life.
If we talking
about globalization, websites has not only brought the world closer together,
but it has allowed the world's to access any part of the world in easiest way.
It brings down the barriers of linguistic and geographic boundaries. But most
common things are that for all purpose we have needs an online medium which is
being possible through websites and its related technology. Suppose if we want
socially connected with globe then we have to use social websites as a platform,
if we want to try any banking or financial works then respective websites help
us. That means from music to rocket science, from banking to knowledge
gathering in online medium we are dependent to websites. It’s provide a smooth
and easiest platform through which our prospective client or customer also
interacts with our business and huge number of sales happen through this only.
As we know there
are always two side of a coin. Same is with websites also. Developers always
try to develop best websites and hackers try to destroy it. Nowadays websites
are at top priority of hackers list who try to steal or damage vital
information. So, there is a need of extraordinary attention towards protection
of websites, especially if we are transferring vital information through it. Hence
websites must be protected in best possible manner.
II. OBJECTIVE
Through this topic
(i.e. “Is your website protected: a
quick study to know “unknown doors to your websites”) we try to focus on loopholes of websites and online
communication medium which affected by the hacker and crackers. We also
summaries some tools by which online website crimes can be taken and some
safety jacket to save your websites in effective manner.
III. UNKNOWN
DOORS TO YOUR WEBSITES WHICH AFFECTED IN MANY WAYS
Websites are the
platform of online medium and backbone of online business, knowledge and
communication. So, it must be protected through below mention threads.[1]
1. SQL Injection Attacks
2. Cross Site Scripting Attacks
3. Man-in-the-middle attack
4. Broken Authentication and Session Management Attacks
5. Click jacking Attacks
6. DNS Cache Poisoning
7. Social Engineering Attacks
8. Symlinking – An Insider Attack
9. Cross Site Request Forgery Attacks
10. Remote Code Execution Attacks
11. DDoS Attack – Distributed Denial Of Service Attack
2. Cross Site Scripting Attacks
3. Man-in-the-middle attack
4. Broken Authentication and Session Management Attacks
5. Click jacking Attacks
6. DNS Cache Poisoning
7. Social Engineering Attacks
8. Symlinking – An Insider Attack
9. Cross Site Request Forgery Attacks
10. Remote Code Execution Attacks
11. DDoS Attack – Distributed Denial Of Service Attack
SQL Injection
Attacks
Generally,
this attack occur when there are flaws in website SQL Database, its libraries,
or even the operating system itself. Attackers inject some hidden query through
webpage’s or websites loopholes. Users open such files with hidden query
unknowingly and fill there details, credit card numbers, private information
etc. In doing so, they have allowed hackers to gain unauthorized access to
private data.
Fig.1- SQL
Injection Attacks [2]
Technical
Injection Attack Example:
An
Injection Attack could have this command line:
String
query = “SELECT * FROM accounts WHERE custID=’” + request.getParameter(“id”)
+”‘”;The hacker modifies the ‘id’ parameter in their browser to send: ‘ or
’1′=’1. This changes the meaning of the query to return all the records from
the accounts database to the hacker, instead of only the intended customers.
Cross Site
Scripting Attacks
These
attacks have become the most prevalent and dangerous security issue affecting
web applications. XSS vulnerabilities occur whenever an application takes data
that originated from a user and sends it to a web browser without first
properly validating or encoding it. XSS attacks can be used to hijack user
sessions, deface websites, conduct port scans on victims’ internal networks,
conduct phishing attacks, and take over users’ browsers.[3]
For
example, if www.ebank.com/info.html has XSS script in it, the user might see a
popup window asking for their credit card and other sensitive info.
Technical
Cross Site Scripting Example:
(String)
page += “<input name=’creditcard’ type=’TEXT’ value=’” +
request.getParameter(“CC”) + “‘>”;
The
attacker modifies the ‘CC’ parameter in their browser to:
‘><script>document.location=’http://www.attacker.com/cgi-bin/cookie.cgi?foo=’+document.cookie</script>’
This
causes the user’s session ID to be sent to the attacker’s website, allowing the
hacker to hijack the user’s current session. That means the hacker has access
to the website admin credentials and can take complete control over it.[4]
Fig.2- Basic Description of stored XSS
attack to steal cookies [5]
Man-in-the-middle
attack
This
attack intercepts a communication between two systems. For example, in an http
transaction the target is the TCP connection between client and server. Using
different techniques, the attacker splits the original TCP connection into 2
new connections, one between the client and the attacker and the other between
the attacker and the server, as shown in below figure.
Once
the TCP connection is intercepted, the attacker acts as a proxy, being able to
read, insert and modify the data in the intercepted communication.
Broken
Authentication and Session Management Attacks
Authentication
systems involve passwords, key management, session IDs, and cookies that can
allow a hacker to access your account from any computer (as long as they are
valid). So, if authentication system and session management is weak then
hackers definitely take advantage of this.
For
Example
Scenario
#1: Airline reservations application supports URL rewriting, putting session
IDs in the URL:
An
authenticated user of the site wants to let his friends know about the sale. He
e-mails the above link without knowing he is also giving away his session ID.
When his friends use the link they will use his session and credit card.
Scenario
#2: Application’s timeouts aren’t set properly. User uses a public computer to
access site. Instead of selecting “logout” the user simply closes the browser
tab and walks away. Attacker uses the same browser an hour later, and that
browser is still authenticated.
Scenario
#3: Insider or external attacker gains access to the system’s password
database. User passwords are not properly hashed, exposing every user’s
password to the attacker.[7]
Click jacking
Attacks
It
is also known as (User Interface redress attack, UI redress attack, UI
redressing) is a malicious technique of tricking a Web user into clicking on
something different from what the user perceives they are clicking on, thus
potentially revealing confidential information or taking control of their
computer while clicking on seemingly innocuous web pages. It is a browser
security issue that is a vulnerability across a variety of browsers and
platforms. A clickjack takes the form of embedded code or a script that can
execute without the user's knowledge, such as clicking on a button that appears
to perform another function. The term "clickjacking" was coined by
Jeremiah Grossman and Robert Hansen in 2008.[8]
Fig.4- Illustration of man-in-the-middle
attack [9]
Social
Engineering Attacks
Social
engineering, in the context of information security, refers to psychological
manipulation of people into performing actions or divulging confidential
information. A type of confidence trick for the purpose of information
gathering, fraud, or system access, it differs from a traditional
"con" in that it is often
one of many steps in a more complex fraud scheme.
Fig.5- Social Engineering attack cycle [10]
Symlinking – An
Insider Attack
In
computing, a symbolic link (also symlink or soft link) is a special type of
file that contains a reference to another file or directory in the form of an
absolute or relative path and that affects pathname resolution.
A
symlinking attack occurs when a hacker positions the symlink in such a way that
the user or application that access the endpoint thinks they’re accessing the
right file when they’re really not.
If
the endpoint file is an output, the consequence of the symlink attack is that
it could be modified instead of the file at the intended location.
Modifications to the endpoint file could include appending, overwriting,
corrupting, or even changing permissions.
Cross Site
Request Forgery Attacks
CSRF
is an attack which forces an end user to execute unwanted actions on a web
application in which he/she is currently authenticated. With a little help of
social engineering (like sending a link via email/chat), an attacker may trick
the users of a web application into executing actions of the attacker's
choosing. A successful CSRF exploit can compromise end user data and operation
in case of normal user. If the targeted end user is the administrator account,
this can compromise the entire web application.[12]
Technical
Example
In
this case the hacker creates a request that will transfer money from a user’s
account, and then embeds this attack in an image request or iframe stored on
various sites under the attacker’s control.
Remote Code
Execution Attacks
A
Remote Code Execution attack is a result of either server side or client side
security weaknesses.
Vulnerable
components may include libraries, remote directories on a server that haven’t
been monitored, frameworks, and other software modules that run on the basis of
authenticated user access. Applications that use these components are always
under attack through things like scripts, malware, and small command lines that
extract information.[13]
DDoS Attack –
Distributed Denial Of Service Attack
In
computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS)
attack is an attempt to make a machine or network resource unavailable to its
intended users. Although the means to carry out, motives for, and targets of a
DoS attack may vary, it generally consists of efforts to temporarily or
indefinitely interrupt or suspend services of a host connected to the Internet
[14]
· Installed software updates and patches of operating system regularly.
· Actually hackers see the weakness of system and take advantages so, always use recent version of software’s.
· Make your database fully authenticated and validated.
· Always close your session after working with website or try to delete history from web browser.
· Never click on seemingly innocuous web pages which save you from Click jacking Attacks.
· See path of the pages before clicking on symbolic link.
· Update your browser also on regular basis.
· Make sure firewall must be installed on your pc and update it regularly.
· Personalize your firewall setting during the setup process which show how much data you want to allow into your system from internet.
· Change your password regularly.
· Always use proper antivirus and scan regularly your pc.
· Make sure anti-virus software updates automatically.
· Install anti-spyware programs onto your system.
· Delete emails from unknown sources.
· Network must be managed with appropriate firewall.
· Check your system software and make sure not any unknown software installed you pc.
· Make your pc password protected.
V. DIFFERENT
METHODOLOGIES USED FOR SAFETY FOR WEBSITES
· Keep your operating system updated/patched. Set it to "auto update".
· Use anti-virus and anti-spyware software and keep them updated.
· Do not visit un-trusted websites or follow links provided by unknown or un-trusted sources.
· Secure your transactions. Look for the "lock" icon on the browser's status bar and be sure "https" appears in the website's address bar before making an online purchase. The "s" stands for "secure" and indicates that the communication with the webpage is encrypted.
· Be cautious about all communications you receive including those purported to be from "trusted entities" and be careful when clicking links contained within those messages.
· Do not respond to any unsolicited (spam) incoming e-mails.
· Do not open any attachments contained in suspicious emails.
· Do not respond to an email requesting personal information or that ask you to "verify your information" or to "confirm your user-id and password."
· Beware of emails that threaten any dire consequences should you not "verify your information".
· Do not enter personal information in a pop-up screen. Providing such information may compromise your identity and increase the odds of identity theft.
· Have separate passwords for work related and non-work related accounts.
· Be educated with modern technology.
VI. CONCLUSIONS
At
the end of “Is your website protected: a quick study to know unknown doors to
your websites” we want to suggest
that this type of attack generally done by hacker and cyber criminals. So,
there is a need of extraordinary attention towards protection of websites,
especially if we are transferring vital information through it. Hence websites
must be protected in best possible manner. Hence
we suggest all website owner to take almost care for making their website as
secured as possible. Always tries to secure your database, validate all inputs,
encrypt all user name and passwords, end sessions properly and close all
possible doors to keep hackers out.
REFERENCES
[2]CiscoReview http://www.cisco.com/en/US/prod/collateral/con netw/ps5719/ps7314/prod_white_paper0900aecd80661ca6.html
[3] Microsoft.com http://www.microsoft.com/security/sir/
trategy/default.aspx#!cross_site_scripting
[4] http://defencely.com/blog/10-popular-ways-hackers-hack-website/
[5] http://www.microsoft.com/security/sir/trategy/default.aspx#!cross_site_scripting
[6] https://www.owasp.org/index.php/Man-in-the-middle_attack
[7] https://www.owasp.org/index.php/Top_10_2013-A2
Broken_Authentication_and_Session_Management
[8] http://en.wikipedia.org/wiki/Clickjacking
[9] http://hackingtech.in/clickjacking-attack-things-you-should-know/
[10] copyright 2002 Gartner G2
[11] http://en.wikipedia.org/wiki/Symbolic_link
[12] https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
[13] http://defencely.com/blog/10-popular-ways-hackers-hack-website/
No comments:
Post a Comment