Page 291 - StudyBook.pdf
P. 291

Communication Security: Web Based Services • Chapter 5  275

                    Even though the site appeared to be legitimate at first glance, reading the infor-
                 mation made visitors realize that the site was a spoof in its truest form.The features
                 of the bogus browser claimed to download pornography up to 10 times faster,
                 tabbed browsing that allows a user to switch from one Microsoft site to another,
                 and the feature of shutting down unexpectedly when visiting sites like Google,
                 iTunes,Apple, and so forth.While the site appears as nothing more than a parody
                 of Microsoft, it shows how simple it is to create a site that can fool (no matter how
                 briefly) users into thinking they’re visiting a site belonging to someone else.

                 Web Server Exploits

                 Web servers host Web pages that are made available to others across the Internet or
                 an intranet. Public Web servers (those accessible from the Internet) always pose an
                 inherent security risk because they must be available to the Internet to do what
                 they are supposed to do. Clients (Web browser software) must be able to send
                 transmissions to the Web server for the purpose of requesting Web pages. However,
                 allowing transmissions to come into the network to a Web server makes the
                 system—and the entire network—vulnerable to attackers, unless measures are
                 undertaken to isolate the Web server from the rest of the internal network.
                    Web server applications, like other software, can contain bugs that can be
                 exploited. For example, in 2001 a flaw was discovered in Microsoft’s IIS software
                 that exploited the code used for the indexing feature.The component was installed
                 by default.When it was running, hackers could create buffer overflows to take con-
                 trol of the Web server and change Web pages or attack the system to bring it down.
                 Microsoft quickly released security patches to address the problem, but many com-
                 panies do not upgrade their software regularly nor do they update it with available
                 fixes as they become available. New and different security holes are being found all
                 the time in all major Web server programs. For example, major flaws have also been
                 found in Apache Web servers’ Hypertext Preprocessor (PHP) scripting language
                 that, if exploited by an attacker, can result in the attacker running arbitrary code on
                 the system. Security patches are available to address these and other issues, but that
                 doesn’t mean they are actually applied to the system.
                    The issue with vulnerabilities is also common in the platforms on which Web
                 servers run, making a Web server vulnerable at its very foundation. For example, in
                 2005, the Zotob Worm infected numerous systems (including those of CNN and
                 the Department of Homeland Security) days after a patch had been released
                 addressing the plug-and-play vulnerability it exploited.While it would be nice to
                 think that these were exceptions to the rule, this often isn’t the case. Many adminis-




                                                                              www.syngress.com
   286   287   288   289   290   291   292   293   294   295   296