Page 288 - StudyBook.pdf
P. 288

272    Chapter 5 • Communication Security: Web Based Services

                 Because cookies can be used to store any kind of textual data, it is important
             that they’re secure.As a developer, the best way to protect people from having the
             information stored in cookies from being viewed is not to store any personal or
             sensitive information in a cookie.This isn’t always an option, but it’s always wise to
             never store any more information than is needed in a cookie.
                 If sensitive data must be stored, then the information should be encrypted and
             transmitted using the Transport Layer Security (TLS) or SSL protocols, which we
             discuss later in this chapter. By using SSL, the cookie can be sent encrypted,
             meaning that the data in the cookie won’t be plain to see if anyone intercepts it.
             Without TLS or SSL, someone using a packet sniffer or other tools to view data
             transmitted across the network will be unable to read the contents of the cookie.
             Web Spoofing

             Web spoofing is a means of tricking users to connect to a different Web server than
             they intended.Web spoofing may be done in a number of ways. It can be done by
             simply providing a link to a fraudulent Web site that looks legitimate, or involve
             more complex attacks in which the user’s request or Web pages requested by the
             user are intercepted and altered.
             One of the more complex methods of Web spoofing involves an attacker that is
             able to see and make changes to Web pages that are transmitted to or from another
             computer (the target machine).These pages can include confidential information
             such as credit card numbers entered into online commerce forms and passwords
             that are used to access restricted Web sites.The changes are not made to the actual
             Web pages on their original servers, but to the copies of those pages that the
             spoofer returns to the Web client who made the request.
                 The term spoofing refers to impersonation, or pretending to be someone or
             something you are not.Web spoofing involves creating a “shadow copy” of a Web
             site or even the entire Web of servers at a specific site. JavaScript can be used to
             route Web pages and information through the attacker’s computer, which imper-
             sonates the destination Web server.The attacker can initiate the spoof by sending e-
             mail to the victim that contains a link to the forged page or putting a link into a
             popular search engine.
                 SSL does not necessarily prevent this sort of “man-in-the-middle” (MITM)
             attack; the connection appears to the victim user to be secure because it is secure.
             The problem is that the secure connection is to a different site than the one to
             which the victim thinks they are connecting.Although many modern browsers will
             indicate a problem with the SSL certificate not matching, hyperlink spoofing exploits




          www.syngress.com
   283   284   285   286   287   288   289   290   291   292   293