SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
April 2012
    Hacker Intelligence Initiative, Monthly Trend Report #9


Automation of Attacks
1. Overview
Cyber-criminals are increasingly using automation to carry out their attacks on web applications. This phenomenon has
several reasons:

     ›	 Automatic tools enable an attacker to attack more applications and exploit more vulnerabilities than any manual
       method possibly could.

     ›	 The automatic tools that are available online save the attacker the trouble of studying attack methods and coming
       up with exploits to applications’ vulnerabilities. An attacker can just pick a set of automatic attack tools from the ones
       that are freely available online, install them, point them at lucrative targets, and reap the results.

     ›	 These tools use resources (like compromised servers that are employed as attack platforms) more efficiently.

     ›	 Automatic tools open new avenues for evading security defenses. For example, such a tool can periodically change
       the HTTP User Agent header that is usually sent in each request to an application and that may be used to identify
       and block malicious clients. As another example, sophisticated automatic tools can split the attack between several
       controlled hosts, thus evading being blacklisted.

This report analyzes recently observed trends in the automation of attacks on web applications. The focus is on SQL Injection
(SQLi1) and Remote File Inclusion (RFI2) attacks. Our analysis points out some warning signs that an automatic attack is in
progress and suggests countermeasures for mitigating it. We conclude this report with an analysis of three automated attacks
and demonstrate how each can be identified using the suggested identification methods.




	 See Imperva’s HII report: http://www.imperva.com/download.asp?id=352
1

	 See Imperva’s HII report: http://www.imperva.com/download.asp?id=60
2
Hacker Intelligence Initiative, Monthly Trend Report




Report #9, April 2012                                                     2
Hacker Intelligence Initiative, Monthly Trend Report




2. Detailed Analysis
Hackers considering how to attack Web applications weigh the benefits of a successful attack (money, prestige within their
peers, etc.) against the effort, time, and money needed to accomplish the attack. Using software to attack other software
shifts the balance in this tradeoff, especially if the used software is already available: an unskilled, inexperienced attacker
can easily attack hundreds of applications with a press of a key within minutes and collect his reward relatively safe of the
risks of detection and accountability.
Publicly available software tools assist the attacker in all the phases of an attack: finding potentially vulnerable applications
(for example, using Google Dorks3); scanning these applications to find the unplugged security holes they actually contain;
preparing exploits tailored to the found vulnerabilities; and finally exploiting the found vulnerabilities. Attack tools can
work “vertically,” applying various and more and more sophisticated attacks against a chosen victim, or “horizontally,” doing
a wide but shallow scan for easy pickings within the multitude of applications on the Web. Regardless of the way the hacker
employs the tools in his arsenal, from defensive perspective identifying that incoming traffic is generated by a software
tool is a warning signal that an attack may be in progress. Such an attack may be especially harmful, due to its speed and
thoroughness at finding and exploiting vulnerabilities. On the other hand, if automatic attack can be reliably identified, this
also presents an opportunity to block most of the malicious traffic directed at the protected application.

2.1 Automation identification methods
2.1.1 Traffic shape
Traffic characteristics like attack rate, attack rate change and attack volume are prime candidates to identify attacks that
were initiated using automatic tools. Obviously, if a single host issues HTTP requests to an application at a high rate (e.g.,
12 requests per minute) this traffic is software-generated. As Table 1 shows, attack rate alone is enough to flag a significant
number of attacks (especially for RFI) as being software-generated.

                                         Consecutive attacks from same host with     Ratio of Identified automated attacks
    Attack type          Attacks
                                              minimal rate of 12 per minute                  (based on attack rate)
        RFI               60,656                              18,257                                  30.1%
       SQLi              239,993                             177,872                                  74.1%
Table 1: High-rate automated attacks, January-March


Attackers are aware that traffic shape can be used to identify and mitigate attacks that are directed at a specific site.
Advanced automation tools can introduce random timeouts between attacks on a site to imitate the behavior of an
innocent human user. An attack tool can also use the time between attacks on a specific application to attack multiple
other applications on other sites. Thus, each application sees just the low rate of attack directed at it. Another option for
attackers to avoid rate-based detection of their activity is to issue the attack from multiple hosts. This kind of distributed
attack is still coordinated by a single human attacker, but the victim application logs only low traffic rate from each sender
of HTTP requests.
An automatic tool attacking an unknown application must run through a long phase of exploring combinations of the
application’s URLs and parameters to find vulnerable ones. If the tool tries to avoid rate-based defense mechanisms by
slowing down its interaction with the application, it will generate an unusually long communication pattern. A human user,
on the other hand, will rarely interact with an application continuously for hours at a time.
A high rate of attacks from a host should not be used as an exclusive indicator that this specific host initiates automated
attacks. For example, large parts of the traffic directed at an application may pass through Content Delivery Network
servers or other types of Web proxies. Such Web elements cannot be “blamed” for the traffic that passes through them. To
get a complete and truthful identification that an application is under automated attack, generic traffic shape thresholds
should be combined with other attack indicators or application-specific profiling.

	 See Imperva’s HII report: http://www.imperva.com/download.asp?id=171
3




Report #9, April 2012                                                                                                             3
Hacker Intelligence Initiative, Monthly Trend Report




2.1.2 HTTP headers
Attack automation tools that are freely available online are often published as legitimate penetration testing tools.
Therefore, they mark the traffic they produce with an application-specific User Agent string. For example, the popular SQL
injection tools sqlmap4 and Havij5 send requests with a User Agent containing “sqlmap” and “Havij,” respectively. These tools
are often used by malicious attackers, so a black list of values of the User Agent header is sometimes useful for identifying
automatic attacks, even when its traffic volume is low. However, the tools can masquerade as prevalent browsers by using
the same header’s value they generate. During January-March, 3.8% of the SQLi attacks we observed contained a “havij” User
Agent, and 4.6% contained a “sqlmap” User Agent. Another 4.7% of the SQLi attacks had “NetSparker” User Agent, but they all
composed a single attack. Similarly, “libwww-perl” appeared in the User Agent of 2.7% of the RFI attacks we observed during
this period. This indicates that these attacks were initiated from scripts written in Perl – one of the favorite programming
languages for hackers (though it has many legitimate uses as well).
Generally, HTTP requests generated by automation tools often do not contain headers6 that web browsers usually send,
like Accept-Language or Accept-Charset that shows the languages and character sets that the client can handle. Again, these
headers can be faked, and on the other hand, a benevolent client may also drop these headers, however the absence hints
that the traffic should be closely monitored.
As the figure shows, 98% of RFI attacks and 88% of SQLi attacks are automated, as indicated by the high rate of their
initiation from the attacking host or the missing HTTP Accept headers in the attack messages (or both).

                RFI                         RFI                                    SQLi                   SQLi


                                            High Rate and Missing Accept Headers                          High Rate and Missing Accept Headers


                                            Missing Accept Headers                                        Missing Accept Headers


                                            High Rate                                                     High Rate




Figure 1: Distribution of RFI and SQLi attacks: Having high initiation rate and/or missing Accept headers
Looking at the pattern of occurrences of automated attacks as revealed by these indicators (Figure 2), attacks without
Accept headers are sometimes sent at a high rate. However, tools also send them very frequently at low rates, as can be seen
for RFI in Figure 2. This can be explained as either a deliberate ploy to avoid detection or as a side effect of the tool being
used to attack multiple applications concurrently and not for a concentrated attack on a single application. Furthermore, the
graph reveals different patterns between the two attack types: While in RFI, there is a lot of relatively low-rate traffic without
Accept headers; in SQLi, the most dominant attacks have high rate and still contain the Accept headers. This distinction
further emphasizes the importance of using multiple indicators to identify automated malicious attacks, as each of them
yields somewhat different portions of the traffic.




4
 	 See: http://sqlmap.sourceforge.net/
5
 	 See: http://itsecteam.com/en/projects/project1.htm
6
 	 See: http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html

Report #9, April 2012                                                                                                                            4
Hacker Intelligence Initiative, Monthly Trend Report




Figure 2: Occurrence of automated attacks having high initiation rate and/or missing Accept headers, during the last week of
March 2012.


2.1.3 Tool fingerprints
Automatic attack tools implement some specific algorithm for finding and exploiting application vulnerabilities. Though
each tool may be able to adapt to various attack targets and scenarios, the traffic it produces is eventually limited by the
software itself. Analyzing the history of attacks can sometimes show patterns that match the tool that generated them, like
specific strings in generated SQL fragments used in SQL injection. Such patterns can also be extracted directly from the
source code of the tool, if it is available for investigation.
Fingerprints of tools can be used to identify automated attacks with high certainty. However, each one is specialized to
some versions of a specific tool, so an ongoing research effort is needed to keep a list of such fingerprints relevant for newly
published attack tools.




Report #9, April 2012                                                                                                          5
Hacker Intelligence Initiative, Monthly Trend Report




2.1.4 Host’s black lists
When an automated attack is identified from a host, it is very likely that the malicious application that ran on this host will
continue to attack the same or other applications in the near future. Therefore, the IP addresses of such suspicious hosts may
be collected in a black list, and any traffic from them should be closely examined. The IPs in the black list contents should be
expired or refreshed periodically according to new indicators of the traffic content from the respective hosts.
As an example of the potential usefulness of a blacklist of IPs that initiated automated attacks, we took a closer look at the
hosts that issued attacks without Accept headers during January-March. 4,990 hosts issued such automated SQLi attacks,
and 2,730 hosts issued such automated RFI attacks. We observed that for these hosts, the median of the count of attacks and
attacks’ activity days is low. Also, the distribution of these values is wildly divergent, as seen from the ratio of the standard
deviation to the mean (see Table 2).
However, as Figure shows, a large group of the hosts involved in SQLi attacks were very actively attacking for about three
weeks, and a group of hosts continued to attack for much longer, up to 80 days. Figure shows that a large portion of RFI
attackers was very active during even longer periods. Attackers that were active for at least three days accounted for 30% of
the automated SQLi attacks and 61% of the automated RFI attacks.
We conclude that with appropriate thresholds on attack activity period of identified automatic attackers, blacklists of these
attackers can be extracted from observed attack traffic. These lists can be used to block significant portions of following
attacks. As can be seen in Figures 3 and 4, in both attack types some attacks last for more than two months, thus making
blacklists a useful tool for blocking attackers. The value of each list expires within a few days or weeks (depending on the
attack type), but with periodic refreshment this simple mechanism is a very useful security tool.
Its importance is enhanced when blacklists are shared by communities of applications, since an attacker identified by one
application can be blacklisted and blocked by all other applications before any harm can be done.

                                       Median              Mean                 Standard Deviation                  Max
          Attacks activity days            1                3.28                         8.4                         81
 SQLi
          Count of attacks                 3                21.7                       334.4                       19,119
          Attacks activity days            1                 5.4                        12.7                         90
 RFI
          Count of attacks                 4                21.3                       188.1                       8,956
Table 2: Attacking hosts’ activity characteristics




Report #9, April 2012                                                                                                           6
Hacker Intelligence Initiative, Monthly Trend Report




Figure 3: Activity of hosts issuing automated SQLi attacks (without Accept headers). The number of attacks is presented on
logarithmic scale.




Figure 4: Activity of hosts issuing automated RFI attacks (without Accept headers). The number of attacks is presented on
logarithmic scale.


2.2 Automatic attacks trends
2.2.1 Geographic origin of attacks
The observed SQLi attacks without Accept headers during January-March originated from 4,990 hosts located at 74
countries. For RFI, the attacks came from 2,730 hosts and 69 countries. As Table 3 shows 80% of the automated SQLi
attackers were hosts in the United States. While 49% of RFI attackers were located at the United States, the rest were more
evenly distributed. This is also illustrated in Figures 5 and 6.




Report #9, April 2012                                                                                                         7
Hacker Intelligence Initiative, Monthly Trend Report




                                  SQLi                                                                    RFI
    Country                       Hosts                 % of Hosts          Country                      Hosts              % of Hosts
    USA                           3994                       80             USA                           1337                  49
    China                          355                        7             Germany                       170                   6
    United Kingdom                 75                         2             France                        146                   5
    Russian Federation             49                         1             United Kingdom                124                   5
    Canada                         40                         1             Canada                        105                   4
    Republic of Korea              33                         1             Republic of Korea              80                   3
    Germany                        31                         1             Netherlands                    68                   2
    Brazil                         29                         1             Brazil                         54                   2
    India                          28                         1             Russian Federation             51                   2
    France                         24                         1             Italy                          41                   2
Table 3: Geographic distribution7 of hosts sending automated (without Accept headers) RFI and SQLi attacks




Figure 5: Hosts initiating automated (without Accept headers) SQLi attacks per country


Figure 6: Hosts initiating automated (without Accept headers) RFI attacks per country




	 The number of hosts per country is not normalized by the total number of hosts on each country
7




Report #9, April 2012                                                                                                                     8
Hacker Intelligence Initiative, Monthly Trend Report




A further analysis of the attacking hosts that issued high-rate attacks (that is, higher than 12 requests per minute), revealed a
somewhat different pattern.
As shown in Table 4, 30% of SQLi attacking hosts originate from China, exceeding even the USA. These two countries
account together for more than half the high-rate SQLi attacks, while the other attackers are distributed among some quite
unusual countries, like Egypt, Morocco, and Luxemburg. This might be consistent with the spreading use of automated,
user-friendly attacking tools that enables inexperienced users to execute attacks rather easily.
                                  SQLi                                                                    RFI
    Country                       Hosts                 % of Hosts          Country                      Hosts              % of Hosts
    China                          98                        30             USA                            58                   39
    USA                            78                        24             Germany                        16                   11
    Netherlands                     9                         3             France                         11                   7
    Morocco                         8                         2             Republic of Korea               5                   3
    Egypt                           7                         2             Italy                           5                   3
    Luxemburg                       7                         2             Netherlands                     5                   3
    Brazil                          7                         2             Spain                           4                   3
    France                          7                         2             Turkey                          4                   3
    Indonesia                       6                         2             Canada                          4                   3
    Russian Federation              6                         2             Japan                           2                   1
Table 4: Geographic distribution8 of hosts sending high-rate RFI and SQLi attacks




Figure 7: Hosts initiating high-rate SQLi attacks per country




	 The number of hosts per country is not normalized by the total number of hosts on each country
8




Report #9, April 2012                                                                                                                     9
Hacker Intelligence Initiative, Monthly Trend Report




Figure 8: Hosts initiating high-rate RFI attacks per country


2.3 Compromised servers as attack platforms
We have confirmed9 that at least 57 of the 4,990 hosts that issued automated SQLi attacks were compromised HTTP servers.
Similarly, we have confirmed that 462 of the 2,730 hosts that issued automated RFI attacks were compromised HTTP servers.
The high ratio of compromised servers in RFI attacks (17%) is interesting, since this kind of attack is intended to take control
of a web application. The exploits used in RFI attacks often let the attacker maintain a hidden control channel to the server
on which the compromised application is deployed. Through this channel, the attacker combines the infected server into
his distributed platform of computing resources, and uses it to attack yet other applications on the Internet. This growing
network of maliciously controlled servers can be compared to spreading of a disease within a population through carriers.

2.4 Automation Examples
In this section we demonstrate how the above-mentioned methods can be used to identify automated attacks, as were
observed in our data. Although these attacks use different attack methods, different tools and have different aims, using the
outlined methods in collaboration enables us to identify all of them.
2.4.1 Havij
As mentioned earlier, Havij is a popular freely available SQL injection tool, known for its efficiency.
2.4.1.1 Rate
The average rate was 70 requests per minute, with the slowest attack having 38 requests per minute obviously much faster
than any human attacker could reach manually.




	 Other hosts that participated in the attacks may be compromised servers, but we were unable to confirm this
9




Report #9, April 2012                                                                                                                     10
Hacker Intelligence Initiative, Monthly Trend Report




2.4.1.2 HTTP Headers
None of the requests had Accept-Language or Accept-Charset headers, suggesting they were not generated by a normal
browser.
Most of the requests had Havij typical user agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR
2.0.50727) Havij. These requests also had other headers, like “Host” and “Accept.” The rest of the requests had no headers at
all, and, therefore, were identified by other measures.
2.4.1.3 Tool Fingerprint
The injected SQL strings usually contain a constant number that is repeated in changing amount of times. (For example:
999999.9 union all select 0x31303235343830303536,0x31303235343830303536,0x31303235343830303536—)
This number can be used as a fingerprint unique for the identification of Havij-generated attacks.
2.4.1.4	 2.4.2.4 Blacklists/ Reputation
A query in an IP database revealed that the attacking IP is recognized as a mail server and dictionary attacker.
2.4.2 Nikto Scanner
Nikto is an open-source scanner that tests for various weaknesses and vulnerabilities, among which RFI, Directory Traversal,
Cross-Site Scripting, and SQL injection. It also tests for outdated versions and potentially dangerous files.
2.4.2.1 Rate
The observed attack vectors had a rate of 540 requests per minute, with the slowest vector having 264 requests per minute.
Such high-rate activity should immediately set an alarm.
2.4.2.2 HTTP Headers
As stated on its website: “Nikto is not designed as an overly stealthy tool10…”.
Thus, all the requests contain the typical user agent that contains, apart from the tool’s name and version, also a “Test ID”
that identifies the specific vulnerability scanned.
In the observed attack, TestIDs go from 1 to 6486. e.g. Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:000108)
Each Test ID seeks a certain vulnerability in a predefined set of locations. For example, Test:000003 requests look for the
file cart32.exe in 21 different locations on the attacked machine. The same goes for Test:000004, that searches the file
classified.cgi. Each numeric TestID fits a certain file. Other Test IDs contain the type of the test, for example:
Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:map_codes)
Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:Port Check)
Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:embedded detection)
Other than the user agent, headers like “Content-Type” and “Connection” appear occasionally in Nikto requests, but neither
of the requests had Accept headers.
2.4.2.3 Tool Fingerprint
As the User Agent appears in all the requests, it serves as a good fingerprint to identify the tool.
Another unique identifier can be found in the URL Nikto uses in its RFI tests; in each request, the URL http://cirt.net/rfiinc.
txt? is inserted in a different HTTP parameter. The file contains the php code: <?php phpinfo(); ?> that simply checks
whether this parameter is vulnerable for RFI attacks.
2.4.2.4 Reputation
In this case, there was nothing to suggest the source of the attack had malicious reputation. The source IP was allocated to
LightEdge.com, a Cloud computing provider.
To conclude, attacks generated by Nikto scanner have a typical user agent, no Accept headers, show high frequency of
requests and have a typical URL used for RFI.


 	See: http://cirt.net/nikto2
10




Report #9, April 2012                                                                                                           11
Hacker Intelligence Initiative, Monthly Trend Report




2.4.3 A Bruteforce Login Attack
In this attack, the attacker tried to login to the site with the username “root,” using a predefined set of passwords. The
passwords were tried in alphabetical order (abdol, abraham, adult, admin, ahmed, ahmet, and so on…) and no password
was repeated more than once.
2.4.3.1 Rate
The attacker sent 285 requests per minute, amounting to a total of 6,526 requests.
2.4.3.2 HTTP Headers
The user agent of the requests was User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows 98). This is weird, since the
value contains the string itself “User-Agent:” at the beginning, which is not supposed to happen. We can speculate that the
tool generating these requests allows the user to configure manually a user agent, and, presumably, the attacker inserted
“User-Agent” at the beginning by mistake. Although this is probably a one-time incident, it demonstrates the importance of
being aware of allowed and “normal appearing” headers, user agent in particular.
As in the previous attacks, this attack as well had no Accept headers but only occasional “Cache-Control,” “Connection,” etc.
2.4.3.3 Tool Fingerprints
Half of the requests were login attempts, in which the username and password were delivered in HTTP Parameters. The
other half contained a single Parameter, “token,” whose value was always set to: “5a94a47d909ce4888776555f0f795b60”.
This string may also be used in the future to identify the same tool.
2.4.3.4 Reputation
The same attacking IP was seen scanning other targets several days prior to this attack. The other scans were conducted
using Dfind Scanner, another freely available scanning tool. The same IP using different tools to attack on different occasions
illustrates the importance of keeping and updating blacklists of suspicious IPs.



3. Summary and Conclusions
With automation, the odds of cyber attack are close to 100%. How can security teams prepare and stop malicious,
automated site traffic in order to:
   ›	 Block attacks early and efficiently.
   ›	 Defend against 0 days.
  ›	 To save analysis resources by clustering all attack vectors related to the same attack to a single group.
Detecting automation require abilities greater than plain signatures. Moreover, detecting bad automation must also allow
non-malicious automation. How can you do this?
Contending with automated attacks requires:
   ›	 Rate-based detection mechanism: Automated tools often interact with sites at inhuman speeds. Signatures, however,
      are usually confined to single event. The ability to detect inhuman interactions is a key step.
   ›	 Missing or unique headers: Signatures are good at detecting existing pattern not in detecting missing pieces.
      Automated tools often lack headers, divulging their ulterior intentions. But malicious automation can be distinguished
      by its use of unique headers or payloads.
   ›	 Identify by using the experience of others (reputation): Automated attacks sources tend to attack many targets.




Imperva                                             Tel: +1-650-345-9000
3400 Bridge Parkway, Suite 200                      Fax: +1-650-345-9004	
Redwood City, CA 94065                              www.imperva.com

© Copyright 2012, Imperva
All rights reserved. Imperva, SecureSphere, and “Protecting the Data That Drives Business” are registered trademarks of Imperva.
All other brand or product names are trademarks or registered trademarks of their respective holders. #HII-APRIL#9-2012-0412rev1

Weitere ähnliche Inhalte

Was ist angesagt?

website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019Eoin Keary
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET Journal
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasuresidescitation
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_SeminarJisoo Park
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityijcsa
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 

Was ist angesagt? (20)

website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different Types
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
521 524
521 524521 524
521 524
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
50120130406012
5012013040601250120130406012
50120130406012
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
44641917 091011
44641917 09101144641917 091011
44641917 091011
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 

Andere mochten auch

WearableAgency - We develop home automation application
WearableAgency - We develop home automation applicationWearableAgency - We develop home automation application
WearableAgency - We develop home automation applicationWearable Agency
 
Home Automation with InduSoft Web Studio and John Rasmussen
Home Automation with InduSoft Web Studio and John RasmussenHome Automation with InduSoft Web Studio and John Rasmussen
Home Automation with InduSoft Web Studio and John RasmussenAVEVA
 
android app based home automation
android app based home automationandroid app based home automation
android app based home automationAshikur Rahman
 
web based Flow well automation system
web based Flow well automation systemweb based Flow well automation system
web based Flow well automation systemFAKHRUN NISHA
 
Home System automation using android application
Home System automation using android applicationHome System automation using android application
Home System automation using android applicationdoaamarzook
 
Embedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PIEmbedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PIEditor IJMTER
 
Home Automation by Android Application based Remote Control
Home Automation by Android Application based Remote ControlHome Automation by Android Application based Remote Control
Home Automation by Android Application based Remote ControlEdgefxkits & Solutions
 
Home automation using_pc
Home automation using_pcHome automation using_pc
Home automation using_pcSumit Sonawane
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksImperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.Imperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 

Andere mochten auch (20)

WearableAgency - We develop home automation application
WearableAgency - We develop home automation applicationWearableAgency - We develop home automation application
WearableAgency - We develop home automation application
 
Home Automation with InduSoft Web Studio and John Rasmussen
Home Automation with InduSoft Web Studio and John RasmussenHome Automation with InduSoft Web Studio and John Rasmussen
Home Automation with InduSoft Web Studio and John Rasmussen
 
android app based home automation
android app based home automationandroid app based home automation
android app based home automation
 
Home Automation
Home AutomationHome Automation
Home Automation
 
web based Flow well automation system
web based Flow well automation systemweb based Flow well automation system
web based Flow well automation system
 
Home System automation using android application
Home System automation using android applicationHome System automation using android application
Home System automation using android application
 
Embedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PIEmbedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PI
 
Home Automation by Android Application based Remote Control
Home Automation by Android Application based Remote ControlHome Automation by Android Application based Remote Control
Home Automation by Android Application based Remote Control
 
Home automation using_pc
Home automation using_pcHome automation using_pc
Home automation using_pc
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 

Ähnlich wie Automation of Web Application Attacks

Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File InclusionImperva
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedJennifer Campbell
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
 
An Anatomy of a SQL Injection Attack
An Anatomy of a SQL Injection AttackAn Anatomy of a SQL Injection Attack
An Anatomy of a SQL Injection AttackImperva
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networksijsrd.com
 
BDSE03-1121-API-PresentationTemplate.pptx
BDSE03-1121-API-PresentationTemplate.pptxBDSE03-1121-API-PresentationTemplate.pptx
BDSE03-1121-API-PresentationTemplate.pptxSudhanshuKachhotia
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxsorayan5ywschuit
 
Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)Imperva
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesijcsa
 

Ähnlich wie Automation of Web Application Attacks (20)

Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File Inclusion
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Em36849854
Em36849854Em36849854
Em36849854
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
An Anatomy of a SQL Injection Attack
An Anatomy of a SQL Injection AttackAn Anatomy of a SQL Injection Attack
An Anatomy of a SQL Injection Attack
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Ananth3
Ananth3Ananth3
Ananth3
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
BDSE03-1121-API-PresentationTemplate.pptx
BDSE03-1121-API-PresentationTemplate.pptxBDSE03-1121-API-PresentationTemplate.pptx
BDSE03-1121-API-PresentationTemplate.pptx
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docx
 
Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
185
185185
185
 

Mehr von Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Mehr von Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Automation of Web Application Attacks

  • 1. April 2012 Hacker Intelligence Initiative, Monthly Trend Report #9 Automation of Attacks 1. Overview Cyber-criminals are increasingly using automation to carry out their attacks on web applications. This phenomenon has several reasons: › Automatic tools enable an attacker to attack more applications and exploit more vulnerabilities than any manual method possibly could. › The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An attacker can just pick a set of automatic attack tools from the ones that are freely available online, install them, point them at lucrative targets, and reap the results. › These tools use resources (like compromised servers that are employed as attack platforms) more efficiently. › Automatic tools open new avenues for evading security defenses. For example, such a tool can periodically change the HTTP User Agent header that is usually sent in each request to an application and that may be used to identify and block malicious clients. As another example, sophisticated automatic tools can split the attack between several controlled hosts, thus evading being blacklisted. This report analyzes recently observed trends in the automation of attacks on web applications. The focus is on SQL Injection (SQLi1) and Remote File Inclusion (RFI2) attacks. Our analysis points out some warning signs that an automatic attack is in progress and suggests countermeasures for mitigating it. We conclude this report with an analysis of three automated attacks and demonstrate how each can be identified using the suggested identification methods. See Imperva’s HII report: http://www.imperva.com/download.asp?id=352 1 See Imperva’s HII report: http://www.imperva.com/download.asp?id=60 2
  • 2. Hacker Intelligence Initiative, Monthly Trend Report Report #9, April 2012 2
  • 3. Hacker Intelligence Initiative, Monthly Trend Report 2. Detailed Analysis Hackers considering how to attack Web applications weigh the benefits of a successful attack (money, prestige within their peers, etc.) against the effort, time, and money needed to accomplish the attack. Using software to attack other software shifts the balance in this tradeoff, especially if the used software is already available: an unskilled, inexperienced attacker can easily attack hundreds of applications with a press of a key within minutes and collect his reward relatively safe of the risks of detection and accountability. Publicly available software tools assist the attacker in all the phases of an attack: finding potentially vulnerable applications (for example, using Google Dorks3); scanning these applications to find the unplugged security holes they actually contain; preparing exploits tailored to the found vulnerabilities; and finally exploiting the found vulnerabilities. Attack tools can work “vertically,” applying various and more and more sophisticated attacks against a chosen victim, or “horizontally,” doing a wide but shallow scan for easy pickings within the multitude of applications on the Web. Regardless of the way the hacker employs the tools in his arsenal, from defensive perspective identifying that incoming traffic is generated by a software tool is a warning signal that an attack may be in progress. Such an attack may be especially harmful, due to its speed and thoroughness at finding and exploiting vulnerabilities. On the other hand, if automatic attack can be reliably identified, this also presents an opportunity to block most of the malicious traffic directed at the protected application. 2.1 Automation identification methods 2.1.1 Traffic shape Traffic characteristics like attack rate, attack rate change and attack volume are prime candidates to identify attacks that were initiated using automatic tools. Obviously, if a single host issues HTTP requests to an application at a high rate (e.g., 12 requests per minute) this traffic is software-generated. As Table 1 shows, attack rate alone is enough to flag a significant number of attacks (especially for RFI) as being software-generated. Consecutive attacks from same host with Ratio of Identified automated attacks Attack type Attacks minimal rate of 12 per minute (based on attack rate) RFI 60,656 18,257 30.1% SQLi 239,993 177,872 74.1% Table 1: High-rate automated attacks, January-March Attackers are aware that traffic shape can be used to identify and mitigate attacks that are directed at a specific site. Advanced automation tools can introduce random timeouts between attacks on a site to imitate the behavior of an innocent human user. An attack tool can also use the time between attacks on a specific application to attack multiple other applications on other sites. Thus, each application sees just the low rate of attack directed at it. Another option for attackers to avoid rate-based detection of their activity is to issue the attack from multiple hosts. This kind of distributed attack is still coordinated by a single human attacker, but the victim application logs only low traffic rate from each sender of HTTP requests. An automatic tool attacking an unknown application must run through a long phase of exploring combinations of the application’s URLs and parameters to find vulnerable ones. If the tool tries to avoid rate-based defense mechanisms by slowing down its interaction with the application, it will generate an unusually long communication pattern. A human user, on the other hand, will rarely interact with an application continuously for hours at a time. A high rate of attacks from a host should not be used as an exclusive indicator that this specific host initiates automated attacks. For example, large parts of the traffic directed at an application may pass through Content Delivery Network servers or other types of Web proxies. Such Web elements cannot be “blamed” for the traffic that passes through them. To get a complete and truthful identification that an application is under automated attack, generic traffic shape thresholds should be combined with other attack indicators or application-specific profiling. See Imperva’s HII report: http://www.imperva.com/download.asp?id=171 3 Report #9, April 2012 3
  • 4. Hacker Intelligence Initiative, Monthly Trend Report 2.1.2 HTTP headers Attack automation tools that are freely available online are often published as legitimate penetration testing tools. Therefore, they mark the traffic they produce with an application-specific User Agent string. For example, the popular SQL injection tools sqlmap4 and Havij5 send requests with a User Agent containing “sqlmap” and “Havij,” respectively. These tools are often used by malicious attackers, so a black list of values of the User Agent header is sometimes useful for identifying automatic attacks, even when its traffic volume is low. However, the tools can masquerade as prevalent browsers by using the same header’s value they generate. During January-March, 3.8% of the SQLi attacks we observed contained a “havij” User Agent, and 4.6% contained a “sqlmap” User Agent. Another 4.7% of the SQLi attacks had “NetSparker” User Agent, but they all composed a single attack. Similarly, “libwww-perl” appeared in the User Agent of 2.7% of the RFI attacks we observed during this period. This indicates that these attacks were initiated from scripts written in Perl – one of the favorite programming languages for hackers (though it has many legitimate uses as well). Generally, HTTP requests generated by automation tools often do not contain headers6 that web browsers usually send, like Accept-Language or Accept-Charset that shows the languages and character sets that the client can handle. Again, these headers can be faked, and on the other hand, a benevolent client may also drop these headers, however the absence hints that the traffic should be closely monitored. As the figure shows, 98% of RFI attacks and 88% of SQLi attacks are automated, as indicated by the high rate of their initiation from the attacking host or the missing HTTP Accept headers in the attack messages (or both). RFI RFI SQLi SQLi High Rate and Missing Accept Headers High Rate and Missing Accept Headers Missing Accept Headers Missing Accept Headers High Rate High Rate Figure 1: Distribution of RFI and SQLi attacks: Having high initiation rate and/or missing Accept headers Looking at the pattern of occurrences of automated attacks as revealed by these indicators (Figure 2), attacks without Accept headers are sometimes sent at a high rate. However, tools also send them very frequently at low rates, as can be seen for RFI in Figure 2. This can be explained as either a deliberate ploy to avoid detection or as a side effect of the tool being used to attack multiple applications concurrently and not for a concentrated attack on a single application. Furthermore, the graph reveals different patterns between the two attack types: While in RFI, there is a lot of relatively low-rate traffic without Accept headers; in SQLi, the most dominant attacks have high rate and still contain the Accept headers. This distinction further emphasizes the importance of using multiple indicators to identify automated malicious attacks, as each of them yields somewhat different portions of the traffic. 4 See: http://sqlmap.sourceforge.net/ 5 See: http://itsecteam.com/en/projects/project1.htm 6 See: http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html Report #9, April 2012 4
  • 5. Hacker Intelligence Initiative, Monthly Trend Report Figure 2: Occurrence of automated attacks having high initiation rate and/or missing Accept headers, during the last week of March 2012. 2.1.3 Tool fingerprints Automatic attack tools implement some specific algorithm for finding and exploiting application vulnerabilities. Though each tool may be able to adapt to various attack targets and scenarios, the traffic it produces is eventually limited by the software itself. Analyzing the history of attacks can sometimes show patterns that match the tool that generated them, like specific strings in generated SQL fragments used in SQL injection. Such patterns can also be extracted directly from the source code of the tool, if it is available for investigation. Fingerprints of tools can be used to identify automated attacks with high certainty. However, each one is specialized to some versions of a specific tool, so an ongoing research effort is needed to keep a list of such fingerprints relevant for newly published attack tools. Report #9, April 2012 5
  • 6. Hacker Intelligence Initiative, Monthly Trend Report 2.1.4 Host’s black lists When an automated attack is identified from a host, it is very likely that the malicious application that ran on this host will continue to attack the same or other applications in the near future. Therefore, the IP addresses of such suspicious hosts may be collected in a black list, and any traffic from them should be closely examined. The IPs in the black list contents should be expired or refreshed periodically according to new indicators of the traffic content from the respective hosts. As an example of the potential usefulness of a blacklist of IPs that initiated automated attacks, we took a closer look at the hosts that issued attacks without Accept headers during January-March. 4,990 hosts issued such automated SQLi attacks, and 2,730 hosts issued such automated RFI attacks. We observed that for these hosts, the median of the count of attacks and attacks’ activity days is low. Also, the distribution of these values is wildly divergent, as seen from the ratio of the standard deviation to the mean (see Table 2). However, as Figure shows, a large group of the hosts involved in SQLi attacks were very actively attacking for about three weeks, and a group of hosts continued to attack for much longer, up to 80 days. Figure shows that a large portion of RFI attackers was very active during even longer periods. Attackers that were active for at least three days accounted for 30% of the automated SQLi attacks and 61% of the automated RFI attacks. We conclude that with appropriate thresholds on attack activity period of identified automatic attackers, blacklists of these attackers can be extracted from observed attack traffic. These lists can be used to block significant portions of following attacks. As can be seen in Figures 3 and 4, in both attack types some attacks last for more than two months, thus making blacklists a useful tool for blocking attackers. The value of each list expires within a few days or weeks (depending on the attack type), but with periodic refreshment this simple mechanism is a very useful security tool. Its importance is enhanced when blacklists are shared by communities of applications, since an attacker identified by one application can be blacklisted and blocked by all other applications before any harm can be done. Median Mean Standard Deviation Max Attacks activity days 1 3.28 8.4 81 SQLi Count of attacks 3 21.7 334.4 19,119 Attacks activity days 1 5.4 12.7 90 RFI Count of attacks 4 21.3 188.1 8,956 Table 2: Attacking hosts’ activity characteristics Report #9, April 2012 6
  • 7. Hacker Intelligence Initiative, Monthly Trend Report Figure 3: Activity of hosts issuing automated SQLi attacks (without Accept headers). The number of attacks is presented on logarithmic scale. Figure 4: Activity of hosts issuing automated RFI attacks (without Accept headers). The number of attacks is presented on logarithmic scale. 2.2 Automatic attacks trends 2.2.1 Geographic origin of attacks The observed SQLi attacks without Accept headers during January-March originated from 4,990 hosts located at 74 countries. For RFI, the attacks came from 2,730 hosts and 69 countries. As Table 3 shows 80% of the automated SQLi attackers were hosts in the United States. While 49% of RFI attackers were located at the United States, the rest were more evenly distributed. This is also illustrated in Figures 5 and 6. Report #9, April 2012 7
  • 8. Hacker Intelligence Initiative, Monthly Trend Report SQLi RFI Country Hosts % of Hosts Country Hosts % of Hosts USA 3994 80 USA 1337 49 China 355 7 Germany 170 6 United Kingdom 75 2 France 146 5 Russian Federation 49 1 United Kingdom 124 5 Canada 40 1 Canada 105 4 Republic of Korea 33 1 Republic of Korea 80 3 Germany 31 1 Netherlands 68 2 Brazil 29 1 Brazil 54 2 India 28 1 Russian Federation 51 2 France 24 1 Italy 41 2 Table 3: Geographic distribution7 of hosts sending automated (without Accept headers) RFI and SQLi attacks Figure 5: Hosts initiating automated (without Accept headers) SQLi attacks per country Figure 6: Hosts initiating automated (without Accept headers) RFI attacks per country The number of hosts per country is not normalized by the total number of hosts on each country 7 Report #9, April 2012 8
  • 9. Hacker Intelligence Initiative, Monthly Trend Report A further analysis of the attacking hosts that issued high-rate attacks (that is, higher than 12 requests per minute), revealed a somewhat different pattern. As shown in Table 4, 30% of SQLi attacking hosts originate from China, exceeding even the USA. These two countries account together for more than half the high-rate SQLi attacks, while the other attackers are distributed among some quite unusual countries, like Egypt, Morocco, and Luxemburg. This might be consistent with the spreading use of automated, user-friendly attacking tools that enables inexperienced users to execute attacks rather easily. SQLi RFI Country Hosts % of Hosts Country Hosts % of Hosts China 98 30 USA 58 39 USA 78 24 Germany 16 11 Netherlands 9 3 France 11 7 Morocco 8 2 Republic of Korea 5 3 Egypt 7 2 Italy 5 3 Luxemburg 7 2 Netherlands 5 3 Brazil 7 2 Spain 4 3 France 7 2 Turkey 4 3 Indonesia 6 2 Canada 4 3 Russian Federation 6 2 Japan 2 1 Table 4: Geographic distribution8 of hosts sending high-rate RFI and SQLi attacks Figure 7: Hosts initiating high-rate SQLi attacks per country The number of hosts per country is not normalized by the total number of hosts on each country 8 Report #9, April 2012 9
  • 10. Hacker Intelligence Initiative, Monthly Trend Report Figure 8: Hosts initiating high-rate RFI attacks per country 2.3 Compromised servers as attack platforms We have confirmed9 that at least 57 of the 4,990 hosts that issued automated SQLi attacks were compromised HTTP servers. Similarly, we have confirmed that 462 of the 2,730 hosts that issued automated RFI attacks were compromised HTTP servers. The high ratio of compromised servers in RFI attacks (17%) is interesting, since this kind of attack is intended to take control of a web application. The exploits used in RFI attacks often let the attacker maintain a hidden control channel to the server on which the compromised application is deployed. Through this channel, the attacker combines the infected server into his distributed platform of computing resources, and uses it to attack yet other applications on the Internet. This growing network of maliciously controlled servers can be compared to spreading of a disease within a population through carriers. 2.4 Automation Examples In this section we demonstrate how the above-mentioned methods can be used to identify automated attacks, as were observed in our data. Although these attacks use different attack methods, different tools and have different aims, using the outlined methods in collaboration enables us to identify all of them. 2.4.1 Havij As mentioned earlier, Havij is a popular freely available SQL injection tool, known for its efficiency. 2.4.1.1 Rate The average rate was 70 requests per minute, with the slowest attack having 38 requests per minute obviously much faster than any human attacker could reach manually. Other hosts that participated in the attacks may be compromised servers, but we were unable to confirm this 9 Report #9, April 2012 10
  • 11. Hacker Intelligence Initiative, Monthly Trend Report 2.4.1.2 HTTP Headers None of the requests had Accept-Language or Accept-Charset headers, suggesting they were not generated by a normal browser. Most of the requests had Havij typical user agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) Havij. These requests also had other headers, like “Host” and “Accept.” The rest of the requests had no headers at all, and, therefore, were identified by other measures. 2.4.1.3 Tool Fingerprint The injected SQL strings usually contain a constant number that is repeated in changing amount of times. (For example: 999999.9 union all select 0x31303235343830303536,0x31303235343830303536,0x31303235343830303536—) This number can be used as a fingerprint unique for the identification of Havij-generated attacks. 2.4.1.4 2.4.2.4 Blacklists/ Reputation A query in an IP database revealed that the attacking IP is recognized as a mail server and dictionary attacker. 2.4.2 Nikto Scanner Nikto is an open-source scanner that tests for various weaknesses and vulnerabilities, among which RFI, Directory Traversal, Cross-Site Scripting, and SQL injection. It also tests for outdated versions and potentially dangerous files. 2.4.2.1 Rate The observed attack vectors had a rate of 540 requests per minute, with the slowest vector having 264 requests per minute. Such high-rate activity should immediately set an alarm. 2.4.2.2 HTTP Headers As stated on its website: “Nikto is not designed as an overly stealthy tool10…”. Thus, all the requests contain the typical user agent that contains, apart from the tool’s name and version, also a “Test ID” that identifies the specific vulnerability scanned. In the observed attack, TestIDs go from 1 to 6486. e.g. Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:000108) Each Test ID seeks a certain vulnerability in a predefined set of locations. For example, Test:000003 requests look for the file cart32.exe in 21 different locations on the attacked machine. The same goes for Test:000004, that searches the file classified.cgi. Each numeric TestID fits a certain file. Other Test IDs contain the type of the test, for example: Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:map_codes) Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:Port Check) Mozilla/4.75 (Nikto/2.1.4) (Evasions:None) (Test:embedded detection) Other than the user agent, headers like “Content-Type” and “Connection” appear occasionally in Nikto requests, but neither of the requests had Accept headers. 2.4.2.3 Tool Fingerprint As the User Agent appears in all the requests, it serves as a good fingerprint to identify the tool. Another unique identifier can be found in the URL Nikto uses in its RFI tests; in each request, the URL http://cirt.net/rfiinc. txt? is inserted in a different HTTP parameter. The file contains the php code: <?php phpinfo(); ?> that simply checks whether this parameter is vulnerable for RFI attacks. 2.4.2.4 Reputation In this case, there was nothing to suggest the source of the attack had malicious reputation. The source IP was allocated to LightEdge.com, a Cloud computing provider. To conclude, attacks generated by Nikto scanner have a typical user agent, no Accept headers, show high frequency of requests and have a typical URL used for RFI. See: http://cirt.net/nikto2 10 Report #9, April 2012 11
  • 12. Hacker Intelligence Initiative, Monthly Trend Report 2.4.3 A Bruteforce Login Attack In this attack, the attacker tried to login to the site with the username “root,” using a predefined set of passwords. The passwords were tried in alphabetical order (abdol, abraham, adult, admin, ahmed, ahmet, and so on…) and no password was repeated more than once. 2.4.3.1 Rate The attacker sent 285 requests per minute, amounting to a total of 6,526 requests. 2.4.3.2 HTTP Headers The user agent of the requests was User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows 98). This is weird, since the value contains the string itself “User-Agent:” at the beginning, which is not supposed to happen. We can speculate that the tool generating these requests allows the user to configure manually a user agent, and, presumably, the attacker inserted “User-Agent” at the beginning by mistake. Although this is probably a one-time incident, it demonstrates the importance of being aware of allowed and “normal appearing” headers, user agent in particular. As in the previous attacks, this attack as well had no Accept headers but only occasional “Cache-Control,” “Connection,” etc. 2.4.3.3 Tool Fingerprints Half of the requests were login attempts, in which the username and password were delivered in HTTP Parameters. The other half contained a single Parameter, “token,” whose value was always set to: “5a94a47d909ce4888776555f0f795b60”. This string may also be used in the future to identify the same tool. 2.4.3.4 Reputation The same attacking IP was seen scanning other targets several days prior to this attack. The other scans were conducted using Dfind Scanner, another freely available scanning tool. The same IP using different tools to attack on different occasions illustrates the importance of keeping and updating blacklists of suspicious IPs. 3. Summary and Conclusions With automation, the odds of cyber attack are close to 100%. How can security teams prepare and stop malicious, automated site traffic in order to: › Block attacks early and efficiently. › Defend against 0 days. › To save analysis resources by clustering all attack vectors related to the same attack to a single group. Detecting automation require abilities greater than plain signatures. Moreover, detecting bad automation must also allow non-malicious automation. How can you do this? Contending with automated attacks requires: › Rate-based detection mechanism: Automated tools often interact with sites at inhuman speeds. Signatures, however, are usually confined to single event. The ability to detect inhuman interactions is a key step. › Missing or unique headers: Signatures are good at detecting existing pattern not in detecting missing pieces. Automated tools often lack headers, divulging their ulterior intentions. But malicious automation can be distinguished by its use of unique headers or payloads. › Identify by using the experience of others (reputation): Automated attacks sources tend to attack many targets. Imperva Tel: +1-650-345-9000 3400 Bridge Parkway, Suite 200 Fax: +1-650-345-9004 Redwood City, CA 94065 www.imperva.com © Copyright 2012, Imperva All rights reserved. Imperva, SecureSphere, and “Protecting the Data That Drives Business” are registered trademarks of Imperva. All other brand or product names are trademarks or registered trademarks of their respective holders. #HII-APRIL#9-2012-0412rev1