Web Spoofing Documentation
Web Spoofing Documentation
Web Spoofing Documentation
BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY
WEB SPOOFING
1. WHAT IS SPOOFING?
Spoofing means pretending to be something you are not. In Internet terms it
means pretending to be a different Internet address from the one you really have in
order to gain something. That might be information like credit card numbers,
passwords, personal information or the ability to carry out actions using someone else’s
identity.
INTRODUCTION
Web spoofing allows an attacker to create a "shadow copy" of the entire World
Wide Web. Accesses to the shadow Web are funneled through the attacker's machine,
allowing the attacker to monitor the all of the victim's activities including any
passwords or account numbers the victim enters. The attacker can also cause false or
misleading data to be sent to Web servers in the victim's name, or to the victim in the
name of any Web server. In short, the attacker observes and controls everything the
victim does on the Web.
Web Spoofing is a security attack that allows an adversary to observe and
modify all web pages sent to the victim's machine, and observe all information entered
into forms by the victim. Web Spoofing works on both of the major browsers and isnot
prevented by "secure" connections. The attacker can observe and modify all web pages
and form submissions, even when the browser's "secure connection" indicator is lit. The
user sees no indication that anything is wrong.
The attack is implemented using JavaScript and Web server plug- ins, and works
in two parts. First, the attacker causes a browser window to be created on the victim's
machine, with some of the normal status and menu information replaced by identical-
looking components supplied by the attacker. Then, the attacker causes all Web pages
destined for the victim's machine to be routed through the attacker's server. On the
attacker's server, the pages are rewritten in such a way that their appearance does not
change at all, but any actions taken by the victim (such as clicking on a link) would be
logged by the attacker. In addition, any attempt by the victim to load a new page would
cause the newly-loaded page to be routed through the attacker's server, so the attack
would continue on the new page.The attack is initiated when the victim visits a
malicious Web page, or receives a malicious email message (if the victim uses an
HTML-enabled email reader).
3. HOW WEB SPOOFING WORKS?
Web spoofing is a kind of electronic con game in which the attacker creates a
convincing but false copy of the entire World Wide Web. The false Web looks just like
the real one: it has all the same pages and links. However, the attacker controls the false
Web, so that all network traffic between the victim's browser and the Web goes through
the attacker.
Consequences Since the attacker can observe or modify any data going from the victim
to Web servers, as well as controlling all return traffic from Web servers to the
victim, the attacker has many possibilities. These include surveillance and
tampering.
Surveillance The attacker can passively watch the traffic, recording which pages the
victim visits and the contents of those pages. When the victim fills out a form, the
entered data is transmitted to a Web server, so the attacker can record that too, along
with the response sent back by the server. Since most on-line commerce is done via
forms, this means the attacker can observe any account numbers or passwords the
victim enters.
The attacker can carry out surveillance even if the victim has a "secure"
connection (usually via Secure Sockets Layer) to the server, that is, even if the victim's
browser shows the secure-connection icon (usually an image of a lock or a key).
Tampering The attacker is also free to modify any of the data traveling in either
direction between the victim and the Web. The attacker can modify form data submitted
by the victim. For example, if the victim is ordering a product on-line, the attacker can
change the product number, the quantity, or the ship-to address.
The attacker can also modify the data returned by a Web server, for example by
inserting misleading or offensive material in order to trick the victim or to cause
antagonism between the victim and the server.
One distressing property of this attack is that it works even when the victim
requests a page via a "secure" connection. If the victim does a "secure" Web access (a
Web access using the Secure Sockets Layer) in a false Web, everything will appear
normal: the page will be delivered, and the secure connection indicator (usually an
image of a lock or key) will be turned on.
What is SSL?
SSL stands for Secure Sockets Layer. This protocol, designed by Netscape
Communications Corp., is used to send encrypted HTTP (Web) transactions.
Seeing "https" in the URL box on your browser means SSL is being used to
encrypt data as it travels from your browser to the server. This helps protect sensitive
information--social security and credit card numbers, bank account balances, and other
personal information--as it is sent.
The victim's browser says it has a secure connection because it does have one.
Unfortunately the secure connection is to www.attacker.org and not to the place the
victim thinks it is. The victim's browser thinks everything is fine: it was told to access a
URL at www.attacker.org so it made a secure connection to www.attacker.org. The
secure-connection indicator only gives the victim a false sense of security.
There is one clue that the attacker cannot eliminate, but it is very unlikely to be
noticed.
By using the browser's "view source" feature, the victim can look at the HTML
source for the currently displayed page. By looking for rewritten URLs in the HTML
source, the victim can spot the attack. Unfortunately, HTML source is hard for novice
users to read, and very few Web surfers bother to look at the HTML source for
documents they are visiting, so this provides very little protection.
A related clue is available if the victim chooses the browser's "view document
information" menu item. This will display information including the document's real
URL, possibly allowing the victim to notice the attack. As above, this option is almost
never used so it is very unlikely that it will provide much protection.
6.4 Bookmarks
There are several ways the victim might accidentally leave the attacker's false
Web during the attack. Accessing a bookmark or jumping to a URL by using the
browser's "Open location" menu item might lead the victim back into the real Web. The
victim might then reenter the false Web by clicking the "Back" button. We can imagine
that the victim might wander in and out of one or more false Webs. Of course,
bookmarks can also work against the victim, since it is possible to bookmark a page in a
false Web. Jumping to such a bookmark would lead the victim into a false Web again.
6. WEB SPOOFING DEMONSTRATION
The HTML Source Code
<HTML>
<HEAD>
<TITLE>Web Spoofing Demonstration
</TITLE>
</HEAD>
<BODY onload=init()>
<HR>
<H2>Spoofing</H2>
<P>In both the cases below, if you mouse-over the link below, you'll see
“http://basement.dartmouth.edu" in the status line at the bottom of your screen.
<P>If you click on it, and you're not susceptible, then you'll actually go there.
<P>If you click on it, and you are susceptible, then we'll pop open a new
window for you.
<P><A onclick="return openWin();
"href="http://basement.dartmouth.edu/"> Click here to see a spoof, if you're configured
correctly.</A></P>
<P><A onclick="javascript:openRealWin();return false;"
href="http://basement.dartmouth.edu/">Click here to see the real basement
site</A></P>
<P>
<HR>
</BODY>
</HTML>
The HTML Page as seen
Spoofing
In both the cases below, if you mouse-over the link below, you'll see
"http://basement.dartmouth.edu" in the status line at the bottom of your screen.
If you click on it, and you're not susceptible, then you'll actually go there.
If you click on it, and you are susceptible, then we'll pop open a new window for you.
Click here to see a spoof, if you're configured correctly.
Click here to see the real basement site
REMEDIES
Web spoofing is a dangerous and nearly undetectable security attack that can be
carried out on today's Internet. Fortunately there are some protective measures you can
take.
1. disable JavaScript in your browser so the attacker will be unable to hide the
evidence of the attack;
2. make sure your browser's location line is always visible;
3. pay attention to the URLs displayed on your browser's location line, making sure
they always point to the server you think you're connected to.
This strategy will significantly lower the risk of attack, though you could still be
victimized if you are not conscientious about watching the location line.
At present, JavaScript, ActiveX, and Java all tend to facilitate spoofing and other
security attacks, so we recommend that you disable them. Doing so will cause you to
lose some useful functionality, but you can recoup much of this loss by selectively
turning on these features when you visit a trusted site that requires them.
7. IMPLICATIONS
Since spoofing each aspect of behavior of each common platform takes a lot of
work, we do not believe that convincing long-lived “shadow Web” attacks are likely.
However, short-lived sessions with narrow user behavior are much more susceptible. In
theory, we could have connected our spoofed page to the real WebBlitz service, put out
some misleading links, and monitored our friends’ email. The emergence of common
user interface technologies is also leading to a continued blurring of the boundaries
between what servers and browsers tell users, and between internal and external data
paths.
For example, Netscape’s Personal Security Manager has been touted as the solution to
client security management. However, the sequence of windows that pop up to collect
the user’s password that protects these client keys are all easily spoofable enabling
remote malicious servers to learn these passwords. Further exploration here would be
interesting. Another interesting area would be to explore the potential of using spoofing
for users of Web-like OS interfaces.
We are also examining the de facto semantics that current browsers offer for certificate
handling for various devious but legal sessions
8. CONCLUSION
In the developer community, currently web users, and in particular naïve
users, are vulnerable to different web spoofing attacks; elsewhere, phishing and
spoofing attacks are in fact increasingly common. In this paper, we describe browser
and protocol extensions that we are designing and implementing, that will help prevent
web- spoofing (and phishing) attacks. The main idea is to enhance browsers with a
mandatory Trust Bar (Trust Bar), with a fixed location at the top of every web page The
most important credential is probably the Logo of the organization, used to provide and
re- enforce the brand; and, when some trusted authority certifies the logo or other
credentials of the site, the logo of that trusted authority (e.g. certificate authority). Our
hope is that browser developers will incorporate the Trust Bar as soon as possible, i.e.
make Trust Bar-enabled browsers. We hope to soon make available the source code of
our implementation of the Trust Bar (for the Mozilla browser), and we will be happy to
cooperate with others on creating high-quality open source code available.
11.1 GUIDELINES
Users should follow to increase their security
2 . Always contact sensitive web sites by typing their address in the location bar, using
a bookmark or following a link from a secure site, preferably protected by SSL/TLS.
3 . Never click on links from e-mail messages or from other non- trustworthy sources
(such as shady or possibly insecure web sites). These could lead you to a `URL-
forwarding` man-in-the-middle attack, which may be hard or impossible to detect, even
if you follow guideline 1 above.
4 . Be very careful to inspect the location bar and the SSL icon upon entering to
sensitive web pages. Preferably, set up your browser to display the details of the
certificate upon entering your most sensitive sites (most browsers can do this); this will
help you notice the use of SSL and avoid most attacks. Do not trust indications of
security and of the use of SSL when they appear as part of the web page, even when this
page belongs to trustworthy organizations.
5.If possible, restrict the damages due to spoofing by instructing you’re financial
services to limit online transactions in your account to cover only what you really need.
Furthermore, consider using sensitive online services that use additional protection
mechanisms beyond SSL. Conclusions for Owners of Sensitive Web-sites Owners of
sensitive web-sites are often financial institutions, with substantial interest in security
and ability to influence their consumers and often even software developers.
11.2 SOLUTIONS
That the entities should follow
1 .Provide your customers with a browser with security enhancements as described here,
and encourage them to install and use it. We notice that the basic `Trust Bar`
enhancement, available in our site as of August 2004 for Mozilla, may suffice for most
sites and customers. Many software integrators can perform such enhancements to
Mozilla and other browsers easily, possibly taking advantage of the source code of our
implementation.
2 .Use means of authenticating transactions that are not vulnerable to web spoofing. In
particular, `challenge-response` and similar one-time user authentication solutions can
be effective against offline spoofing attacks (but may still fail against a determined
attacker who is spoofing your web site actively in a `man in the middle` attack). Using
SSL client authentication can be even more effective, and avoid the hardware token (but
may be more complex and less convenient to the user).
4 . Use cookies to personalize the main web page of each customer, e.g. include
personal greeting by name and/or by a personalized mark/picture (e.g. see [PM04]).
Also, warn users against using the page if the personal greeting is absent. This will foil
many of the phishing attacks, which will be unable to present personalized pages. We
also recommend that site owners are careful to educate consumers on the secure web
and e-mail usage guidelines, including these mentioned above, as well as educate them
on the structure of domain name and how to identify their corporate domains. This may
include restricting corporate domains to only these that end with a clear corporate
identity.
12.REFERENCES
2.http://www.washington.edu/computing/windows/issue22/spoofing.html
3. http://www.cs.princeton.edu/sip/WebSpoof ing/
4. http://www.cs.princeton.edu/sip/pub/spoofing.html