SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Web-­‐based	
  A*acks	
  on	
  Host-­‐
 Proof	
  Encrypted	
  Storage	
  
   Weekly	
  Security	
  and	
  Privacy	
  Talk	
  
                     	
  
                     	
  
                     	
  
                   Michael	
  Rushanan	
  
WARNING	
  
•  The	
  views	
  presented	
  in	
  this	
  presentaEon	
  are	
  my	
  own	
  and	
  
   do	
  not	
  express	
  the	
  views	
  of	
  the	
  Johns	
  Hopkins	
  University.	
  

•  The	
  content	
  presented	
  in	
  this	
  presentaEon	
  was	
  extracted	
  
   from	
  mulEple	
  academic	
  conference	
  proceedings.	
  

•  Most	
  pictorial	
  references	
  were	
  shamelessly	
  collected	
  from	
  
   the	
  internet	
  and	
  presented	
  without	
  reference.	
  If	
  you	
  find	
  
   your	
  image	
  and	
  wish	
  to	
  request	
  that	
  I	
  provide	
  a	
  reference,	
  
   please	
  email	
  me	
  at	
  the	
  address	
  provided	
  on	
  my	
  website:	
  
   michaelrushanan.org.	
  
Cryptography	
  and	
  the	
  Internet	
  
•  “We	
  need	
  to	
  do	
  some	
  basic	
  engineering”	
  
•  “We	
  need	
  to	
  educate	
  users”	
  

                                         -­‐	
  Steven	
  M.	
  Bellovin	
  
Thank	
  Your	
  not(Sponsors)	
  


                                                     CloudFogger	

           1password	


                                      SpiderOak	




PassPack	

 clipperz	

 RoboForm	




                                        Wuala	


           LastPass	

                                                      BoxCryptor
Keys	
  to	
  the	
  Cloud	
  Castle	
  




         The	
  economist:	
  h*p://www.economist.com/blogs/babbage/2011/05/internet_security	
  
Dropbox	
  Under	
  Fire	
  
•  This	
  economist	
  arEcle	
  points	
  out	
  that	
  Dropbox	
  has	
  
   some	
  shortcomings	
  that	
  really	
  shook	
  up	
  the	
  
   community:	
  
    –  Mobile	
  Apps	
  were	
  only	
  encrypEng	
  in	
  transit.	
  
    –  A	
  vulnerability	
  allowed	
  the	
  inserEon	
  of	
  one	
  configuraEon	
  
       file	
  to	
  allow	
  the	
  sync	
  of	
  an	
  enEre	
  users	
  Dropbox	
  to	
  
       another.	
  
    –  Any	
  employee	
  at	
  Dropbox	
  could	
  decrypt	
  a	
  users	
  file.	
  
    –  Metadata,	
  such	
  as	
  filenames,	
  are	
  le_	
  unencrypted	
  for	
  easy	
  
       searching,	
  indexing,	
  and	
  structure	
  management.	
  
SpiderOak	
  by	
  Contrast	
  
•  SpiderOak	
  cannot	
  disclose	
  user	
  data	
  even	
  if	
  it	
  
   wanted	
  to.	
  
    –  It	
  doesn’t	
  maintain	
  individual	
  user	
  keys	
  that	
  are	
  used	
  to	
  
       encrypt	
  data	
  prior	
  to	
  sending	
  it	
  to	
  the	
  cloud.	
  
    –  However,	
  if	
  the	
  user	
  forgets	
  that	
  secret	
  passphrase,	
  that	
  
       data	
  is	
  as	
  good	
  as	
  gone.	
  
What	
  does	
  this	
  Mean	
  for	
  our	
  Authors?	
  
•  Simple	
  enough,	
  the	
  aforemenEoned	
  provided	
  the	
  
   grounds	
  in	
  which	
  to	
  further	
  explore	
  the	
  
   implementaEon	
  of	
  cloud-­‐based	
  storage	
  (and	
  
   password)	
  managers.	
  
    –  EsEmated	
  25	
  million	
  Dropbox	
  users	
  with	
  third	
  party	
  
       services	
  available	
  for	
  client	
  side	
  encrypEon/decrypEon.	
  
    –  Numerous	
  cloud-­‐based	
  storage	
  providers	
  offering	
  
       “advanced	
  security”.	
  
    –  Many	
  of	
  these	
  clients	
  are	
  implemented	
  both	
  as	
  a	
  naEve	
  
       and	
  web	
  based	
  applicaEon.	
  
Host-­‐Proof	
  Web	
  ApplicaEons	
  
•  Increase	
  in	
  website	
  a*acks.	
  
•  Web	
  service	
  architecture	
  needed	
  a	
  faceli_.	
  
Services	
  &	
  Managers	
  
•  Wuala,	
  SpiderOak:	
  
   –  Cloud-­‐based	
  storage	
  services	
  offering	
  remote	
  encrypted	
  
      storage	
  with	
  the	
  ability	
  to	
  synchronize	
  across	
  all	
  
      authorized	
  devices,	
  with	
  the	
  addiEonal	
  ability	
  to	
  share	
  
      specific	
  files.	
  
•  LastPass,	
  1Password:	
  
   –  Password	
  managers	
  that	
  offer	
  to	
  store	
  confidenEal	
  data	
  
      (credenEals,	
  credit	
  card	
  info)	
  to	
  websites.	
  
Client	
  Side	
  EncrypEon	
  
•  Relies	
  on	
  user	
  having	
  an	
  encrypEon	
  key	
  or	
  knowing	
  a	
  
   passphrase	
  from	
  which	
  the	
  key	
  is	
  derived.	
  
•  All	
  applicaEons	
  analyzed	
  in	
  this	
  paper	
  support	
  
   PBKDF2	
  password-­‐based	
  key	
  derivaEon	
  funcEon	
  
   specificaEon.	
  
•  (ApplicaEon	
  Dependent)	
  EncrypEon	
  schemes	
  used	
  
   tend	
  to	
  be	
  symmetric,	
  AES,	
  and	
  if	
  integrity	
  is	
  
   protected	
  (SpiderOak/Wuala)	
  a	
  Hash	
  MAC	
  is	
  used.	
  
PKCS	
  #5:	
  Password-­‐Based	
  
                        Cryptography	
  Standard	
  
•  “This	
  document	
  provides	
  recommendaEons	
  for	
  the	
  
   implementaEon	
  of	
  password-­‐based	
  cryptography,	
  covering	
  
   key	
  derivaEon	
  funcEons,	
  encrypEon	
  schemes,	
  message-­‐
   authenEcaEon	
  schemes,	
  and	
  ASN.1	
  syntax	
  idenEfying	
  the	
  
   techniques.”	
  

•  PBKDF2	
  applies	
  a	
  pseudorandom	
  funcEon	
  to	
  derive	
  keys.	
  	
  
    1.     Inputs:	
  password,	
  salt,	
  iteraEon	
  count,	
  intended	
  length	
  of	
  the	
  derived	
  key.	
  
    2.      If	
  length	
  of	
  the	
  derived	
  key	
  is	
  greater	
  than	
  2^32-­‐1*length	
  of	
  PRF	
  -­‐	
  key	
  is	
  too	
  long.	
  
    3.      For	
  each	
  block	
  of	
  the	
  derived	
  key	
  apply	
  the	
  following	
  funcEon	
  F:	
  
                     B_1	
  =	
  F(Password,	
  Salt,	
  IteraEon	
  Count,	
  Block	
  Index)	
  
    4.      The	
  funcEon	
  F	
  is	
  defined	
  as	
  the	
  xor	
  sum	
  of	
  the	
  first	
  count	
  iterates	
  of	
  the	
  underlying	
  
            PRF	
  applied	
  to	
  the	
  (password	
  ||	
  salt	
  ||	
  block	
  index).	
  	
  	
  	
  	
  
    5.      Concatenate	
  the	
  blocks	
  and	
  extract	
  the	
  first	
  required	
  length	
  of	
  required	
  key.	
  
    6.     Output:	
  derived	
  key.	
  


          Incase	
  you	
  want	
  to	
  read	
  the	
  whole	
  specificaEon	
  @	
  Internet	
  Engineering	
  Task	
  Force:	
  h*p://tools.ieo.org/html/rfc2898	
  
Lots	
  of	
  Apps	
  use	
  PKCS	
  #5	
  
•  “Secure	
  Password	
  Managers”	
  and	
  “Military-­‐Grade	
  
   EncrypEon”	
  on	
  Smartphones:	
  Oh,	
  Really?	
  
    –  Paper	
  analyzes	
  the	
  security	
  concerns	
  of	
  current	
  mobile	
  
       applicaEons	
  offering	
  password	
  management.	
  
    –  Example	
  1:	
  iOS	
  user	
  configurable	
  backup	
  encrypEon.	
  
         •  Backup	
  encrypEon	
  key	
  is	
  computed	
  by	
  performing	
  
              10,000	
  iteraEons	
  of	
  PBKDF2-­‐SHA1	
  funcEon	
  with	
  
              password	
  as	
  an	
  input.	
  
    –  If	
  the	
  iteraEve	
  count	
  isn’t	
  significant,	
  you	
  allow	
  an	
  a*acker	
  
       to	
  more	
  easily	
  complete	
  an	
  exhausEve	
  search.	
  	
  
    –  Another	
  problem	
  is	
  low	
  entropy	
  passwords.	
  
Brute-­‐Force	
  A*acks	
  by	
  Stretching	
  the	
  
          Low-­‐Entropy	
  Password	
  
•  Make	
  a	
  weak	
  password,	
  say	
  “tesEng,”	
  more	
  
   secure	
  by	
  applying	
  a	
  salt.	
  	
  
•  A	
  similar	
  technique	
  is	
  used	
  for	
  key	
  stretching.	
  
•  Re-­‐visiEng	
  the	
  iteraEon	
  count,	
  it’s	
  important	
  
   to	
  note	
  that	
  one	
  property	
  of	
  key	
  stretching	
  is	
  
   to	
  apply	
  	
  a	
  hash	
  funcEon	
  or	
  block	
  cipher	
  in	
  a	
  
   loop.	
  


                         Secure	
  ApplicaEons	
  of	
  Low	
  Entropy	
  Keys	
  h*p://www.schneier.com/paper-­‐low-­‐entropy.pdf	
  
Jumping	
  into	
  the	
  A*acks	
  
RoboForm	
  Passcard	
  Tampering	
  
•  The	
  card	
  format	
  contains	
  a	
  plaintext	
  URL.	
  
•  An	
  a*acker	
  could	
  exploit	
  the	
  sharing	
  feature	
  
   and	
  modify	
  passcard	
  URL	
  to	
  malicious.com.	
  
1Password	
  Keychain	
  Tampering	
  
•  Same	
  problem	
  with	
  the	
  excepEon	
  that	
  the	
  A*acker	
  now	
  needs	
  
   access	
  to	
  Dropbox	
  where	
  keychains	
  are	
  typically	
  shared.	
  
•  Remember	
  when	
  we	
  menEoned	
  this	
  config	
  a*ack	
  earlier?	
  Here	
  are	
  
   the	
  specifics:	
  
     –  When	
  installing	
  Dropbox	
  it	
  creates	
  a	
  config.db	
  SQLite	
  database	
  file	
  
        that	
  is	
  used	
  to	
  idenEfy	
  the	
  device	
  to	
  the	
  Dropbox	
  account.	
  This	
  file	
  is	
  
        of	
  course	
  read/writeable	
  because	
  it	
  is	
  SQLite	
  a_erall,	
  and	
  is	
  easily	
  
        relocatable.	
  Thus,	
  if	
  an	
  a*acker	
  can	
  grab	
  the	
  said	
  config.db,	
  she	
  can	
  
        sync	
  all	
  of	
  the	
  vicEm	
  files	
  to	
  her	
  computer.	
  
To…	
  
•  Encrypt	
  then	
  MAC?	
  
•  Encrypt	
  and	
  MAC?	
  
•  MAC	
  then	
  Encrypt?	
  
How	
  to	
  Protect?	
  
•  MAC	
  it,	
  duh.	
  
•  AuthenEcated	
  EncrypEon	
  would	
  provide	
  integrity	
  to	
  
   the	
  encrypted	
  private	
  data.	
  
•  Also,	
  authenEcaEng	
  the	
  metadata	
  would	
  be	
  useful	
  in	
  
   these	
  cases	
  to	
  provide	
  integrity.	
  The	
  authors	
  
   recommend	
  an	
  encrypted+MAC	
  approach.	
  Do	
  you	
  
   think	
  that’s	
  overkill?	
  
Hmm…	
  
•  What	
  is	
  the	
  same	
  origin	
  policy?	
  

•  What	
  is	
  JSONP	
  used	
  for?	
  

•  document.domain	
  property	
  
SpiderOak	
  and	
  JSONP	
  
•  JSONP	
  is	
  usually	
  used	
  to	
  get	
  past	
  cross-­‐domain	
  problems	
  (i.e.,	
  
   geung	
  past	
  same	
  origin	
  policy).	
  
•  This	
  creates	
  a	
  bit	
  of	
  heartache	
  for	
  SiderOak	
  as	
  it	
  allows	
  for	
  a	
  
   CSRF.	
  
•  If	
  the	
  user	
  is	
  logged	
  into	
  the	
  SpiderOak	
  website	
  and	
  browsing	
  
   a	
  malicious	
  website,	
  the	
  a*acker	
  might	
  guess	
  the	
  user	
  name	
  
   and	
  retrieve	
  the	
  JSONP	
  object	
  containing	
  a	
  list	
  of	
  her	
  full	
  
   directory	
  structure.	
  
CSRF	
  Anyone?	
  
•  Takers?	
  
Wikipedia’s	
  CSRF	
  ExplanaEon	
  
•  The	
  a*acker	
  must	
  target	
  either	
  a	
  site	
  that	
  doesn't	
  check	
  the	
  
   referrer	
  header	
  (which	
  is	
  common)	
  or	
  a	
  vicEm	
  with	
  a	
  browser	
  or	
  
   plugin	
  bug	
  that	
  allows	
  referer	
  spoofing	
  (which	
  is	
  rare).	
  

•  The	
  a*acker	
  must	
  find	
  a	
  form	
  submission	
  at	
  the	
  target	
  site,	
  or	
  a	
  
   URL	
  that	
  has	
  side	
  effects,	
  that	
  does	
  something	
  (e.g.,	
  transfers	
  
   money,	
  or	
  changes	
  the	
  vicEm's	
  e-­‐mail	
  address	
  or	
  password).	
  

•  The	
  a*acker	
  must	
  determine	
  the	
  right	
  values	
  for	
  all	
  the	
  form's	
  or	
  
   URL's	
  inputs;	
  if	
  any	
  of	
  them	
  are	
  required	
  to	
  be	
  secret	
  
   authenEcaEon	
  values	
  or	
  IDs	
  that	
  the	
  a*acker	
  can't	
  guess,	
  the	
  
   a*ack	
  will	
  fail.	
  

•  The	
  a*acker	
  must	
  lure	
  the	
  vicEm	
  to	
  a	
  Web	
  page	
  with	
  malicious	
  
   code	
  while	
  the	
  vicEm	
  is	
  logged	
  in	
  to	
  the	
  target	
  site.	
  
Sneaky	
  HTTP	
  and	
  Wuala	
  
•  “Wuala	
  maintains	
  an	
  encrypted	
  directory	
  tree	
  where	
  each	
  file	
  
   is	
  encrypted	
  with	
  a	
  different	
  key.”	
  
•  Wuala	
  also	
  runs	
  a	
  lightweight	
  HTTP	
  server	
  used	
  for	
  status	
  
   reporEng.	
  
•  By	
  browsing	
  to	
  the	
  /js/	
  path,	
  you	
  can	
  actually	
  get	
  to	
  the	
  
   defaultuser	
  directory	
  where	
  the	
  master	
  key	
  file	
  is	
  maintained.	
  
   An	
  a*acker	
  could	
  access	
  said	
  file	
  by	
  simply	
  providing	
  a	
  Java	
  
   applet	
  in	
  which	
  to	
  access	
  Wuala	
  encrypted	
  files	
  on	
  her	
  site.	
  
Phishing	
  A*acks	
  on	
  Browser	
  
                          Extensions	
  
•  Why	
  I	
  like	
  this	
  –	
  JavaScript	
  crypto	
  being	
  used!	
  
•  Why	
  I	
  don’t	
  like	
  this	
  –	
  URL	
  parsing	
  is	
  a	
  pain	
  and	
  as	
  the	
  authors	
  
   have	
  shown	
  that	
  by	
  specifically	
  cra_ing	
  links	
  like,	
  
   h*p://www.google.com:xxx@bad.com,	
  it	
  is	
  possible	
  to	
  gain	
  
   our	
  decrypted	
  private	
  data.	
  
Bookmarklets	
  –	
  Who	
  the	
  Hell	
  uses	
  
                 These?	
  
•  A	
  good	
  bookmarklet	
  example	
  was	
  YubNub	
  who	
  a*empted	
  to	
  
   provide	
  a	
  “web	
  command	
  line.”	
  	
  
•  Bookmarklets	
  are	
  executed	
  within	
  the	
  scope	
  of	
  the	
  page	
  and	
  
   thus	
  are	
  vulnerable	
  to	
  a	
  variety	
  of	
  threats.	
  
•  This	
  is	
  problemaEc	
  for	
  LastPass	
  bookmarklet.	
  
Rootkits	
  for	
  JavaScript	
  Environments	
  
•  This	
  paper	
  specifically	
  targets	
  cloud-­‐based	
  password	
  
   managers	
  and	
  is	
  another	
  work	
  by	
  our	
  web	
  security	
  
   hero,	
  Adam	
  Barth.	
  
•  Bookmarklets	
  are:	
  
    –  Easy	
  to	
  develop,	
  install,	
  and	
  run	
  on	
  all	
  browsers.	
  
    –  Are	
  a	
  part	
  of	
  the	
  “mashup”	
  ecosystem.	
  
    –  When	
  acEvated	
  it	
  runs	
  in	
  the	
  context	
  of	
  the	
  currently	
  
       viewed	
  webpage…	
  even	
  if	
  that’s	
  holycrap-­‐I-­‐am-­‐totally-­‐
       malicious.a*acker.screwed.org	
  
    –  This	
  allows	
  the	
  a*acker	
  to	
  carefully	
  cra_	
  her	
  JavaScript	
  
       environment	
  such	
  that	
  it	
  can	
  modify	
  intended	
  execuEon.	
  
JS	
  RootKits	
  
•  A	
  JavaScript	
  rootkit	
  modifies	
  the	
  bookmarklet-­‐visible	
  behavior	
  
   of	
  a	
  JavaScript	
  environment	
  and	
  escapes	
  detecEon	
  by	
  
   overriding	
  the	
  naEve	
  JavaScript	
  objects.	
  
•  Shadowing:	
  Take	
  the	
  names	
  of	
  naEve	
  objects	
  and	
  emulate	
  
   their	
  behavior.	
  
•  Prototype	
  Poisoning:	
  Alter	
  the	
  semanEcs	
  of	
  built-­‐in	
  types	
  by	
  
   altering	
  their	
  prototype	
  objects.	
  	
  
•  ReflecEon:	
  Apply	
  techniques	
  to	
  JS	
  ReflecEon	
  API	
  to	
  hide	
  
   modificaEons	
  from	
  bookmarklets	
  (if	
  a*emping	
  introspecEon).	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Black ops of tcp2005 japan
Black ops of tcp2005 japanBlack ops of tcp2005 japan
Black ops of tcp2005 japanDan Kaminsky
 
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Daniel Bohannon
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorSocially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorMike Felch
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1Chong-Kuan Chen
 
Protecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackProtecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackPonraj
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkChristopher Grayson
 
ReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsPriyanka Aash
 
Derbycon - Passing the Torch
Derbycon - Passing the TorchDerbycon - Passing the Torch
Derbycon - Passing the TorchWill Schroeder
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for PentestingMike Felch
 

Was ist angesagt? (20)

Black ops of tcp2005 japan
Black ops of tcp2005 japanBlack ops of tcp2005 japan
Black ops of tcp2005 japan
 
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016
 
Confidence web
Confidence webConfidence web
Confidence web
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
 
RAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial TradecraftRAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial Tradecraft
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Html5 hacking
Html5 hackingHtml5 hacking
Html5 hacking
 
Addios!
Addios!Addios!
Addios!
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
Socially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front DoorSocially Acceptable Methods to Walk in the Front Door
Socially Acceptable Methods to Walk in the Front Door
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Black opspki 2
Black opspki 2Black opspki 2
Black opspki 2
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 
Protecting Web Services from DDOS Attack
Protecting Web Services from DDOS AttackProtecting Web Services from DDOS Attack
Protecting Web Services from DDOS Attack
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 
ReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security Bugs
 
Derbycon - Passing the Torch
Derbycon - Passing the TorchDerbycon - Passing the Torch
Derbycon - Passing the Torch
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
 
Bridging the Gap
Bridging the GapBridging the Gap
Bridging the Gap
 

Andere mochten auch

Hay vida en las tic’s
Hay vida en las tic’sHay vida en las tic’s
Hay vida en las tic’sayuntamiento
 
Trouvez la faille! - Confoo 2012
Trouvez la faille! - Confoo 2012Trouvez la faille! - Confoo 2012
Trouvez la faille! - Confoo 2012Antonio Fontes
 
Acumar en Movimiento Número 4
Acumar en Movimiento Número 4Acumar en Movimiento Número 4
Acumar en Movimiento Número 4LaAcumar
 
Karuselli 50years_Booklet-N
Karuselli 50years_Booklet-NKaruselli 50years_Booklet-N
Karuselli 50years_Booklet-NTamin Tanzil
 
How to increase e mail newsletter subscribers by 200% 2
How to increase e mail newsletter subscribers by 200% 2How to increase e mail newsletter subscribers by 200% 2
How to increase e mail newsletter subscribers by 200% 2razorsocial
 
HECTOR ROMERO ALVA
HECTOR ROMERO ALVA HECTOR ROMERO ALVA
HECTOR ROMERO ALVA carmen1558
 
G 1 sns-new era of cnt sensing technology
G 1  sns-new era of cnt sensing technologyG 1  sns-new era of cnt sensing technology
G 1 sns-new era of cnt sensing technologyChung Da-woon
 
Brochure comercial del Máster en Dirección de Marketing Digital
Brochure comercial del Máster en Dirección de Marketing DigitalBrochure comercial del Máster en Dirección de Marketing Digital
Brochure comercial del Máster en Dirección de Marketing DigitalJesús Crespo Fernández
 
Boletin FIESTA II enero 2016
Boletin FIESTA II enero 2016Boletin FIESTA II enero 2016
Boletin FIESTA II enero 2016Fiesta II
 
Pedang roh edisi_57
Pedang roh edisi_57Pedang roh edisi_57
Pedang roh edisi_57alkitabiah
 
Pyme Innova. Coaching ejecutivo.
Pyme Innova. Coaching ejecutivo. Pyme Innova. Coaching ejecutivo.
Pyme Innova. Coaching ejecutivo. Imadeinnova
 
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...Michael Brandvold
 
Ptt electronica 1
Ptt electronica 1Ptt electronica 1
Ptt electronica 1FRM FRM
 
Ernst cassirer
Ernst cassirerErnst cassirer
Ernst cassirermaribrondo
 
2016 Brandentrepreneurs Business Boot Camps Speakers
2016 Brandentrepreneurs Business Boot Camps Speakers2016 Brandentrepreneurs Business Boot Camps Speakers
2016 Brandentrepreneurs Business Boot Camps SpeakersChristine Souffrant Ntim
 

Andere mochten auch (20)

Hay vida en las tic’s
Hay vida en las tic’sHay vida en las tic’s
Hay vida en las tic’s
 
Trouvez la faille! - Confoo 2012
Trouvez la faille! - Confoo 2012Trouvez la faille! - Confoo 2012
Trouvez la faille! - Confoo 2012
 
Cris de lara
Cris de laraCris de lara
Cris de lara
 
Acumar en Movimiento Número 4
Acumar en Movimiento Número 4Acumar en Movimiento Número 4
Acumar en Movimiento Número 4
 
targeta madre de una pc
targeta madre de una pctargeta madre de una pc
targeta madre de una pc
 
Karuselli 50years_Booklet-N
Karuselli 50years_Booklet-NKaruselli 50years_Booklet-N
Karuselli 50years_Booklet-N
 
How to increase e mail newsletter subscribers by 200% 2
How to increase e mail newsletter subscribers by 200% 2How to increase e mail newsletter subscribers by 200% 2
How to increase e mail newsletter subscribers by 200% 2
 
HECTOR ROMERO ALVA
HECTOR ROMERO ALVA HECTOR ROMERO ALVA
HECTOR ROMERO ALVA
 
G 1 sns-new era of cnt sensing technology
G 1  sns-new era of cnt sensing technologyG 1  sns-new era of cnt sensing technology
G 1 sns-new era of cnt sensing technology
 
Brochure comercial del Máster en Dirección de Marketing Digital
Brochure comercial del Máster en Dirección de Marketing DigitalBrochure comercial del Máster en Dirección de Marketing Digital
Brochure comercial del Máster en Dirección de Marketing Digital
 
Boletin FIESTA II enero 2016
Boletin FIESTA II enero 2016Boletin FIESTA II enero 2016
Boletin FIESTA II enero 2016
 
Pedang roh edisi_57
Pedang roh edisi_57Pedang roh edisi_57
Pedang roh edisi_57
 
Pyme Innova. Coaching ejecutivo.
Pyme Innova. Coaching ejecutivo. Pyme Innova. Coaching ejecutivo.
Pyme Innova. Coaching ejecutivo.
 
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...
Rock Stars & Porn Stars, Effective Social Networking and Fan Engagement Techn...
 
Ptt electronica 1
Ptt electronica 1Ptt electronica 1
Ptt electronica 1
 
Ernst cassirer
Ernst cassirerErnst cassirer
Ernst cassirer
 
Curso de truficultura
Curso de truficulturaCurso de truficultura
Curso de truficultura
 
2016 Brandentrepreneurs Business Boot Camps Speakers
2016 Brandentrepreneurs Business Boot Camps Speakers2016 Brandentrepreneurs Business Boot Camps Speakers
2016 Brandentrepreneurs Business Boot Camps Speakers
 
Gestion conflictos en educación
Gestion conflictos en educaciónGestion conflictos en educación
Gestion conflictos en educación
 
Res judicata
Res judicataRes judicata
Res judicata
 

Ähnlich wie Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage

How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?Ksenia Peguero
 
How fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapeHow fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapePhil Wilkins
 
Securing Spark Applications by Kostas Sakellis and Marcelo Vanzin
Securing Spark Applications by Kostas Sakellis and Marcelo VanzinSecuring Spark Applications by Kostas Sakellis and Marcelo Vanzin
Securing Spark Applications by Kostas Sakellis and Marcelo VanzinSpark Summit
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark ApplicationsCloudera, Inc.
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationlalitjangra9
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Ajin Abraham
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
OpenStack Swift的性能调优
OpenStack Swift的性能调优OpenStack Swift的性能调优
OpenStack Swift的性能调优Hardway Hou
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)ClubHack
 
Antisnatchor all you ever wanted to know about beef
Antisnatchor   all you ever wanted to know about beefAntisnatchor   all you ever wanted to know about beef
Antisnatchor all you ever wanted to know about beefDefconRussia
 
ZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchorZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchorMichele Orru
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPrashant Rane
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...Lacework
 
Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020Timothy Spann
 

Ähnlich wie Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage (20)

How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?
 
How fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapeHow fluentd fits into the modern software landscape
How fluentd fits into the modern software landscape
 
Securing Spark Applications by Kostas Sakellis and Marcelo Vanzin
Securing Spark Applications by Kostas Sakellis and Marcelo VanzinSecuring Spark Applications by Kostas Sakellis and Marcelo Vanzin
Securing Spark Applications by Kostas Sakellis and Marcelo Vanzin
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark Applications
 
MLSEC 2020
MLSEC 2020MLSEC 2020
MLSEC 2020
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
OpenStack Swift的性能调优
OpenStack Swift的性能调优OpenStack Swift的性能调优
OpenStack Swift的性能调优
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
 
Antisnatchor all you ever wanted to know about beef
Antisnatchor   all you ever wanted to know about beefAntisnatchor   all you ever wanted to know about beef
Antisnatchor all you ever wanted to know about beef
 
ZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchorZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchor
 
2012: Passw3rd
2012: Passw3rd2012: Passw3rd
2012: Passw3rd
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCD
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
 
Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020
 
Burpsuite yara
Burpsuite yaraBurpsuite yara
Burpsuite yara
 
Spark Uber Development Kit
Spark Uber Development KitSpark Uber Development Kit
Spark Uber Development Kit
 

Mehr von Michael Rushanan

Security and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesSecurity and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesMichael Rushanan
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationMichael Rushanan
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 

Mehr von Michael Rushanan (6)

Security and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesSecurity and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical Devices
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of Procrastination
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 

Kürzlich hochgeladen

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 

Kürzlich hochgeladen (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 

Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage

  • 1. Web-­‐based  A*acks  on  Host-­‐ Proof  Encrypted  Storage   Weekly  Security  and  Privacy  Talk         Michael  Rushanan  
  • 2. WARNING   •  The  views  presented  in  this  presentaEon  are  my  own  and   do  not  express  the  views  of  the  Johns  Hopkins  University.   •  The  content  presented  in  this  presentaEon  was  extracted   from  mulEple  academic  conference  proceedings.   •  Most  pictorial  references  were  shamelessly  collected  from   the  internet  and  presented  without  reference.  If  you  find   your  image  and  wish  to  request  that  I  provide  a  reference,   please  email  me  at  the  address  provided  on  my  website:   michaelrushanan.org.  
  • 3.
  • 4.
  • 5. Cryptography  and  the  Internet   •  “We  need  to  do  some  basic  engineering”   •  “We  need  to  educate  users”   -­‐  Steven  M.  Bellovin  
  • 6. Thank  Your  not(Sponsors)   CloudFogger 1password SpiderOak PassPack clipperz RoboForm Wuala LastPass BoxCryptor
  • 7. Keys  to  the  Cloud  Castle   The  economist:  h*p://www.economist.com/blogs/babbage/2011/05/internet_security  
  • 8. Dropbox  Under  Fire   •  This  economist  arEcle  points  out  that  Dropbox  has   some  shortcomings  that  really  shook  up  the   community:   –  Mobile  Apps  were  only  encrypEng  in  transit.   –  A  vulnerability  allowed  the  inserEon  of  one  configuraEon   file  to  allow  the  sync  of  an  enEre  users  Dropbox  to   another.   –  Any  employee  at  Dropbox  could  decrypt  a  users  file.   –  Metadata,  such  as  filenames,  are  le_  unencrypted  for  easy   searching,  indexing,  and  structure  management.  
  • 9. SpiderOak  by  Contrast   •  SpiderOak  cannot  disclose  user  data  even  if  it   wanted  to.   –  It  doesn’t  maintain  individual  user  keys  that  are  used  to   encrypt  data  prior  to  sending  it  to  the  cloud.   –  However,  if  the  user  forgets  that  secret  passphrase,  that   data  is  as  good  as  gone.  
  • 10. What  does  this  Mean  for  our  Authors?   •  Simple  enough,  the  aforemenEoned  provided  the   grounds  in  which  to  further  explore  the   implementaEon  of  cloud-­‐based  storage  (and   password)  managers.   –  EsEmated  25  million  Dropbox  users  with  third  party   services  available  for  client  side  encrypEon/decrypEon.   –  Numerous  cloud-­‐based  storage  providers  offering   “advanced  security”.   –  Many  of  these  clients  are  implemented  both  as  a  naEve   and  web  based  applicaEon.  
  • 11. Host-­‐Proof  Web  ApplicaEons   •  Increase  in  website  a*acks.   •  Web  service  architecture  needed  a  faceli_.  
  • 12. Services  &  Managers   •  Wuala,  SpiderOak:   –  Cloud-­‐based  storage  services  offering  remote  encrypted   storage  with  the  ability  to  synchronize  across  all   authorized  devices,  with  the  addiEonal  ability  to  share   specific  files.   •  LastPass,  1Password:   –  Password  managers  that  offer  to  store  confidenEal  data   (credenEals,  credit  card  info)  to  websites.  
  • 13. Client  Side  EncrypEon   •  Relies  on  user  having  an  encrypEon  key  or  knowing  a   passphrase  from  which  the  key  is  derived.   •  All  applicaEons  analyzed  in  this  paper  support   PBKDF2  password-­‐based  key  derivaEon  funcEon   specificaEon.   •  (ApplicaEon  Dependent)  EncrypEon  schemes  used   tend  to  be  symmetric,  AES,  and  if  integrity  is   protected  (SpiderOak/Wuala)  a  Hash  MAC  is  used.  
  • 14. PKCS  #5:  Password-­‐Based   Cryptography  Standard   •  “This  document  provides  recommendaEons  for  the   implementaEon  of  password-­‐based  cryptography,  covering   key  derivaEon  funcEons,  encrypEon  schemes,  message-­‐ authenEcaEon  schemes,  and  ASN.1  syntax  idenEfying  the   techniques.”   •  PBKDF2  applies  a  pseudorandom  funcEon  to  derive  keys.     1.  Inputs:  password,  salt,  iteraEon  count,  intended  length  of  the  derived  key.   2.  If  length  of  the  derived  key  is  greater  than  2^32-­‐1*length  of  PRF  -­‐  key  is  too  long.   3.  For  each  block  of  the  derived  key  apply  the  following  funcEon  F:   B_1  =  F(Password,  Salt,  IteraEon  Count,  Block  Index)   4.  The  funcEon  F  is  defined  as  the  xor  sum  of  the  first  count  iterates  of  the  underlying   PRF  applied  to  the  (password  ||  salt  ||  block  index).           5.  Concatenate  the  blocks  and  extract  the  first  required  length  of  required  key.   6.  Output:  derived  key.   Incase  you  want  to  read  the  whole  specificaEon  @  Internet  Engineering  Task  Force:  h*p://tools.ieo.org/html/rfc2898  
  • 15. Lots  of  Apps  use  PKCS  #5   •  “Secure  Password  Managers”  and  “Military-­‐Grade   EncrypEon”  on  Smartphones:  Oh,  Really?   –  Paper  analyzes  the  security  concerns  of  current  mobile   applicaEons  offering  password  management.   –  Example  1:  iOS  user  configurable  backup  encrypEon.   •  Backup  encrypEon  key  is  computed  by  performing   10,000  iteraEons  of  PBKDF2-­‐SHA1  funcEon  with   password  as  an  input.   –  If  the  iteraEve  count  isn’t  significant,  you  allow  an  a*acker   to  more  easily  complete  an  exhausEve  search.     –  Another  problem  is  low  entropy  passwords.  
  • 16. Brute-­‐Force  A*acks  by  Stretching  the   Low-­‐Entropy  Password   •  Make  a  weak  password,  say  “tesEng,”  more   secure  by  applying  a  salt.     •  A  similar  technique  is  used  for  key  stretching.   •  Re-­‐visiEng  the  iteraEon  count,  it’s  important   to  note  that  one  property  of  key  stretching  is   to  apply    a  hash  funcEon  or  block  cipher  in  a   loop.   Secure  ApplicaEons  of  Low  Entropy  Keys  h*p://www.schneier.com/paper-­‐low-­‐entropy.pdf  
  • 17. Jumping  into  the  A*acks  
  • 18. RoboForm  Passcard  Tampering   •  The  card  format  contains  a  plaintext  URL.   •  An  a*acker  could  exploit  the  sharing  feature   and  modify  passcard  URL  to  malicious.com.  
  • 19. 1Password  Keychain  Tampering   •  Same  problem  with  the  excepEon  that  the  A*acker  now  needs   access  to  Dropbox  where  keychains  are  typically  shared.   •  Remember  when  we  menEoned  this  config  a*ack  earlier?  Here  are   the  specifics:   –  When  installing  Dropbox  it  creates  a  config.db  SQLite  database  file   that  is  used  to  idenEfy  the  device  to  the  Dropbox  account.  This  file  is   of  course  read/writeable  because  it  is  SQLite  a_erall,  and  is  easily   relocatable.  Thus,  if  an  a*acker  can  grab  the  said  config.db,  she  can   sync  all  of  the  vicEm  files  to  her  computer.  
  • 20. To…   •  Encrypt  then  MAC?   •  Encrypt  and  MAC?   •  MAC  then  Encrypt?  
  • 21. How  to  Protect?   •  MAC  it,  duh.   •  AuthenEcated  EncrypEon  would  provide  integrity  to   the  encrypted  private  data.   •  Also,  authenEcaEng  the  metadata  would  be  useful  in   these  cases  to  provide  integrity.  The  authors   recommend  an  encrypted+MAC  approach.  Do  you   think  that’s  overkill?  
  • 22. Hmm…   •  What  is  the  same  origin  policy?   •  What  is  JSONP  used  for?   •  document.domain  property  
  • 23. SpiderOak  and  JSONP   •  JSONP  is  usually  used  to  get  past  cross-­‐domain  problems  (i.e.,   geung  past  same  origin  policy).   •  This  creates  a  bit  of  heartache  for  SiderOak  as  it  allows  for  a   CSRF.   •  If  the  user  is  logged  into  the  SpiderOak  website  and  browsing   a  malicious  website,  the  a*acker  might  guess  the  user  name   and  retrieve  the  JSONP  object  containing  a  list  of  her  full   directory  structure.  
  • 25. Wikipedia’s  CSRF  ExplanaEon   •  The  a*acker  must  target  either  a  site  that  doesn't  check  the   referrer  header  (which  is  common)  or  a  vicEm  with  a  browser  or   plugin  bug  that  allows  referer  spoofing  (which  is  rare).   •  The  a*acker  must  find  a  form  submission  at  the  target  site,  or  a   URL  that  has  side  effects,  that  does  something  (e.g.,  transfers   money,  or  changes  the  vicEm's  e-­‐mail  address  or  password).   •  The  a*acker  must  determine  the  right  values  for  all  the  form's  or   URL's  inputs;  if  any  of  them  are  required  to  be  secret   authenEcaEon  values  or  IDs  that  the  a*acker  can't  guess,  the   a*ack  will  fail.   •  The  a*acker  must  lure  the  vicEm  to  a  Web  page  with  malicious   code  while  the  vicEm  is  logged  in  to  the  target  site.  
  • 26. Sneaky  HTTP  and  Wuala   •  “Wuala  maintains  an  encrypted  directory  tree  where  each  file   is  encrypted  with  a  different  key.”   •  Wuala  also  runs  a  lightweight  HTTP  server  used  for  status   reporEng.   •  By  browsing  to  the  /js/  path,  you  can  actually  get  to  the   defaultuser  directory  where  the  master  key  file  is  maintained.   An  a*acker  could  access  said  file  by  simply  providing  a  Java   applet  in  which  to  access  Wuala  encrypted  files  on  her  site.  
  • 27. Phishing  A*acks  on  Browser   Extensions   •  Why  I  like  this  –  JavaScript  crypto  being  used!   •  Why  I  don’t  like  this  –  URL  parsing  is  a  pain  and  as  the  authors   have  shown  that  by  specifically  cra_ing  links  like,   h*p://www.google.com:xxx@bad.com,  it  is  possible  to  gain   our  decrypted  private  data.  
  • 28. Bookmarklets  –  Who  the  Hell  uses   These?   •  A  good  bookmarklet  example  was  YubNub  who  a*empted  to   provide  a  “web  command  line.”     •  Bookmarklets  are  executed  within  the  scope  of  the  page  and   thus  are  vulnerable  to  a  variety  of  threats.   •  This  is  problemaEc  for  LastPass  bookmarklet.  
  • 29. Rootkits  for  JavaScript  Environments   •  This  paper  specifically  targets  cloud-­‐based  password   managers  and  is  another  work  by  our  web  security   hero,  Adam  Barth.   •  Bookmarklets  are:   –  Easy  to  develop,  install,  and  run  on  all  browsers.   –  Are  a  part  of  the  “mashup”  ecosystem.   –  When  acEvated  it  runs  in  the  context  of  the  currently   viewed  webpage…  even  if  that’s  holycrap-­‐I-­‐am-­‐totally-­‐ malicious.a*acker.screwed.org   –  This  allows  the  a*acker  to  carefully  cra_  her  JavaScript   environment  such  that  it  can  modify  intended  execuEon.  
  • 30. JS  RootKits   •  A  JavaScript  rootkit  modifies  the  bookmarklet-­‐visible  behavior   of  a  JavaScript  environment  and  escapes  detecEon  by   overriding  the  naEve  JavaScript  objects.   •  Shadowing:  Take  the  names  of  naEve  objects  and  emulate   their  behavior.   •  Prototype  Poisoning:  Alter  the  semanEcs  of  built-­‐in  types  by   altering  their  prototype  objects.     •  ReflecEon:  Apply  techniques  to  JS  ReflecEon  API  to  hide   modificaEons  from  bookmarklets  (if  a*emping  introspecEon).