辅导CS6035 Web Security辅导Java编程
- 首页 >> 其他代写网络安全相关作业,练习常见的网络攻击方法。
Interacting with the VM
After logging in with the above credentials type startx to launch the GUI desktop. VirtualBox guest additions have been pre-installed on the VM. If you wish to install more packages, you may do so by running apt-get as root.
Georgia Tech Payroll
The site we will be exploiting in this project, which you can only visit on the VM. Please note that this is a made-up site and does not point to a legitimate site in the real world. For testing purposes, you may register accounts at your will. However, please DO NOT use your actual passwords and banking account information.
The source code of the site can be found on the VM in /var/payroll/www. There is a bookmark added to the file manager to make your job a bit easier. We will be using Firefox (Iceweasel), which is provided in the VM, to test your exploits. You may also assume JavaScript is always enabled. Do not update your browser version or use something else such as Chrome since we will grade your scripts using the exact same VM that you have downloaded using Firefox (Iceweasel).
GOOD LUCK AND HAVE FUN!
Deliverables Summary/Requirements
There are 3 targets in total worth 70 points, and the write-up is worth an additional 30 points.
Please submit your deliverables on Canvas as separate files. Do NOT zip them. Failure to follow this rule will result in a 5 point penalty on your overall project grade.
Filename | Description |
---|---|
t1.html | Crafted HTML page for Target 1 |
t2.html | Crafted HTML page for Target 2 |
t3.html | Crafted HTML page for Target 3 |
report.pdf | Please include your full name and your Georgia Tech username (e.g. jdoe3) at the top of the report. This should contain the required responses to the Epilogue section. |
Not following the file naming convention above results in a 5 point penalty. Note: Canvas may append additional numbers to you files. This is ok, just be sure to name the original uploaded files as you see above.
Disclaimer
This project is solely for educational purposes. Professor Wenke Lee and the people affiliated with his teaching and research are NOT responsible in the event of any criminal charges brought against any individuals misusing the information in this project to break the law. When in doubt, please consult the TAs or Professor Lee regarding any questions or issues you may have.
Target 1: XSRF
You have stumbled upon the Georgia Tech payroll website and discovered a vulnerability. Suppose a user, say Alice, is already logged into the Georgia Tech payroll site. You noticed that you can craft a web page so that when Alice visits your web page, she gets redirected (NO popups) to the Georgia Tech payroll page with her account number and routing number set to some values of your choice.
Poor and living off of ramen noodles, you decide to give it a try and craft a web page to set the banking information to yours.
You forgot your bank account information, but luckily, you remember storing them inside a secret script you wrote a long time ago.
To fetch your bank account number and routing number, run the get_bank_info script inside the VM and pass in your Georgia Tech username (e.g. jdoe3). Example command on the terminal:
get_bank_info jdoe3
Here is an example of what the script will print out:
Username: jdoe3 Account number: 962362227 Routing number: 2113956237
Double check that you entered your Georgia Tech username. This is the username you use to login to T-square. It is NOT your 9 digit student number. If you enter the wrong username, which generates a different account and routing number, your exploit will fail our scripts, and you will receive zero points for this part.
The user must NOT see the contents of your crafted page! However, a split second due to browser rendering is acceptable.
Deliverables
- t1.html
- Report.pdf (Used for partial credit, see Epilogue)
Notes
You can visit your web page by entering the path of your file in the browser URL bar. For example, this would be file:///home/user/t1.html assuming that your exploit lives in /home/user/. You can also simply double click to open the file in Firefox. This opens your exploit in another tab but this is OK and it works. Your actual exploit code must NOT open a new tab via JavaScript or other means.
Do NOT use relative paths for site URLs in your exploits.
- WRONG -gt; /somefolder/somefile.php
We see this every semester from a hand full of students. Your exploit will fail and you will not receive full credit.
Example of Successful Exploit
Our autograder is a Selenium script so it will simulate button clicks using the same exact browser and VM that you have. It will do the following for Task 1:
- Log into the site using a known good username and password.
- Launch your t1.html file in the same open tab
- Verify that the Changes Saved is on the page and that the account number and routing number matches your assigned values. Do not use 1234567890 as this is just an example. See the screenshot below.
Target 2: XSS Username and Password Theft
You got caught! The good news is that Georgia Tech InfoSec is curious if you can find another vulnerability that is more severe. They will let you off the hook if you help them out. You noticed that you are able to steal a user’s username and password. You can craft a web page such that whenever a victim, say Bob, visits the page, it will redirect him (NO popups).
The web page should look as if Bob visited the site directly. When Bob enters is login information into the page and clicks Log In, an email with his username and password will be sent. Georgia Tech administrators would like you to demonstrate the attack and pay you accordingly. You will have to send the email to the local user account on the virtual machine as a proof of concept.
This attack requires an email to be sent to user on the system. The good news is that you can use hackmail:
http://hackmail.org/sendmail.php
Open the above URL from within virtual machine for instructions on how to send emails via your attack script. Any mail that the user account receives will appear in /var/mail/user. A bookmark has been added to the file manager for your convenience.
Requirements
- The attack must be performed using XSS. Providing a phishing web page will result in 0 points. The browser URL bar should contain the domain and not a phishing URL.
- The email payload should be the user’s username (login) and password separated by a single space. i.e. username password notice the space!
- The sender of the email should be set to RmFsbDIwMThUYXJnZXQyRWFzdGVyRWdn
- Failure to follow this format will result in 0 points for this part.
- The redirected page must be cosmetically identical to the original page. The web page source can be different as long as the user cannot tell without looking at the source. This may take some trial and error. This part can be difficult! Use the developer tools to help you.
Deliverables
- t2.html
- report.pdf (Used for partial credit, see Epilogue)
Notes
Initially there is not a mail file on the VM. We suggest playing around with hackmail outside of your exploit to make sure you can generate a mail file. You’ll simply see a file named “user” show up in the location detailed above. Right click it and open with gedit to view the contents. You can delete the file and hackmail will generate a new one each time you exploit the site. This makes it easier to debug than scrolling a lot in the user file. Delete, exploit to create it and then validate your payload.
Use the developer tools built into Firefox. Simply click F12 in Firefox and you’ll see the dev tools pop up at the bottom. This tool is your friend, get to know it and use it to help you through this task.
Example of Successful Exploit
Our autograder is a Selenium script so it will simulate button clicks using the same exact browser and VM that you have. It will do the following for Task 2:
- Open your t2.html file and verify that the URL of the page is correct and that it is cosmetically identical to the original site. See screenshot below.
- Input a known good username
- Input a known good password a. Note: Your code does not need to handle invalid username and/or password. We’ll only test happy path.
- Click the Log In button
- Inspect the file system for the user file
- Validate that the user file contains username and password and that the sender is RmFsbDIwMThUYXJnZXQyRWFzdGVyRWdn See screenshot below.
After visiting t2.html, the web page should look exactly the same as the legitimate site. Notice there are no cosmetic differences!
The email should be sent via hacker mail.
Target 3: SQL Injection
H4x0r0rg has heard about your feat in making tons of money from Georgia Tech by changing other people’s payroll account. They contacted you and gave you a job, a job with a hefty sum you cannot resist. Your task is to create an HTML webpage, and the requirements are:
- The crafted page has a text field for the username and a submit button.
- NO password field!
- The user of this page is not logged into Georgia Tech payroll system, but when he or she enters a valid Georgia Tech payroll registered username (for example, judyhopps) and clicks submit, the user is redirected and logged in as judyhopps.
- Do NOT execute destructive SQL commands such as DROP tables. System administrators can easily detect data loss!
- The id of the input field must be set to targetlogin, and the button id must be exploit. This is very important as the autograder specifically looks for these elements. Failure to include them will result in a zero for this target.
Deliverables
- t3.html
- report.pdf (Used for partial credit, see Epilogue)
Example of Successful Exploit
Our autograder is a Selenium script so it will simulate button clicks using the same exact browser and VM that you have. It will do the following for Task 3:
- Launch your t3.html file in Firefox. See screenshot below.
- Find the targetlogin input field and replace whatever text is there with a known good username
- Find the exploit submit button and click it
- Inspect the resulting redirected page to ensure it is the correct page and that the user is successfully logged in.
- Ensure that the resulting redirected page is cosmetically identical to the original site.
After visiting t3.html, the page displays an input field for the attacker.
After typing in the username of an existing user in the payroll system, you should be successfully logged in. The site should function as if logged in legitimately.
Epilogue
You delivered your exploit to H4x0r0rg. They seemed quite happy, and so are you. Just the thought of not having to work for the rest of your life seems quite enticing. However, you suddenly hear the FBI knocking on your door. It turns out that H4x0r0rg was just a law enforcement honeypot!
The FBI is willing to let you off the hook this time, but only if you do some work in restitution first. For each of the three targets, describe in report.pdf what the vulnerability is and how to fix it so that they can no longer be exploited. You do not need to include actual patched code. However, your descriptions should be sufficiently detailed that they would be actionable.
Deliverables
- report.pdf
Helpful Readings and Hints
This assignment requires submitting forms. If you do not know how to do so, you may consult http://www.w3schools.com/html/html_forms.asp
This assignment requires writing JavaScript. Only a very basic knowledge of JavaScript is needed. You may find http://eloquentjavascript.net/ useful if you are completely new to JavaScript.
You do not need to have extensive SQL knowledge to complete Target 3. However, it requires some observations and thinking.
The sample HTML deliverables are there for your benefit and convenience. You are not required to follow the format unless specifically called out in the target (ex: Task 3). As long as the exploits work according to the requirements, you will receive full credit.
You are NOT submitting any PHP code in this assignment. Thus, your exploits should not should not modify the provided PHP files on the VM besides for debugging purposes. If you do happen to modify the PHP files, make sure you revert your changes when you test your exploit. We test your exploits using your submitted .html files and run them against the original, unmodified payroll server provided in the VM. This happens every semester, so please make sure to use the original files to test your final exploits.