Google tag

Pages

Web Security

Do you know that one website is hacked every 5 seconds and also 63% of website owners don’t know that they are hacked. You might be the next or you are already a victim. Protecting user and business critical information is the first job of a developer. This post will help you to survive the cyber war.

In this post we will see the ways by which a hacker can hack your website and also how you can stop your website from getting hacked. Let’s get started.

Categorization of hacking methods


Methods to hack a website are divided into two categories. First category includes hacking a website by manipulating the data sources and the second category includes hacking the platform on which the website runs.

Many website are poorly written which fails to handles manipulated data and ultimately the website gets hacked.

By the platform we mean Operating System, DNS Servers, Network, Web Server, Server Language, FTP, SSH, SSL etc., on which the website runs. If any of this things are hacked than your website is hacked.

Preventing data source Attacks


Attacks that are carried out by manipulating data source can be prevented by following simple principles and mechanisms. The below pictures shows how to securely process input and display data.





Its not limited to this. You can create more security layers to protect your and users critical information.

Preventing platform based attacks


Its the job of third party companies to protect their software and hardware on top of which our website runs. But still we can do a lot to secure our website from platform based attacks. The below picture shows some common things you need to carry put to protect your website from platform based attacks.



There are a lot more things you can do to prevent these kinds of attacks.

Now on we will look at some common ways by which by which hackers hack websites. All examples and theory I show on this post are valid for web server as apache and server language as php And next to valid for other technologies.

Error Reporting Attacks


A hacker can submit manipulated data to the server which can sometimes trigger error messages if server scripts fail to handle this kinds of data manipulation. This error messages leak information like directory names, server name, software version and a lot of other things.

Let’s see an example of this kind of poorly written scripts:
index.php


Now when you run this script you will get this error.
This error leaks a lot of information. Some information it leaks are
Website runs on windows operation system
Web server is wamp
File system path to the index.php file

Now hacker can gather this information and try to exploit these software’s to hack our website.

The best solution to this problem is to log errors instead of displaying errors. So that only the administrators can see the errors and hacker don’t get any information.

There are many ways to disable error displaying and enabling error logging.

First method:
php.ini
Second method:
.htaccess
Third method:
index.php
Now when we see our errors in log we will know that there is no validation check for this variable and we will rectify our mistake by modifying the script. To prevent this kids of errors we can do simple validation as shows below.

index.php
***Always disable error display and enable error logging for production use. From now on I will assume that you have disabled error displaying.

HTTP Response Information Leakage Attack


HTTP Response headers can also leak a lot of information about our website which can be used by hackers to hack our website.

HTTP Response Headers which leak information are:
Server: This header leaks OS name, web server name, server language name, versions and some other things.
X-Powered-By: This header leaks the name and version of server side language.

This information is very critical and can be used by the hacker to hack your website.

We can stop web server from leaking this information by changing some variable values in httpd.conf and php.ini files.

httpd.conf
php.ini

Client Side Validation Attacks


Never depend on client side validation. Hackers can easily bypass it and can do a lot of things to hack your website.

Lets see a demo of how to break client side validation and hack a website.

index.php
This script looks absolutely fine and works well. But a attacker can easily inspect the HTML source code And remove “required” field and change “email” type to “text”. Now the the HTML code on client side will look something like this

Now the hacker can insert any random text in the email field and submit it instead of inserting a email address. Something like this:



And now hacker has broken your validation layers and can insert random text which you don’t want and now your website is vulnerable to spams. We can also do very powerful things like XSS attacks. We will learn more about XSS attacks in later sections.

We can prevent such attacks by validating the form data on server side also. Here we can change the code to this


SQL Injection


SQL injection is a technique where hackers can inject SQL commands into an SQL statements, via data sources.

Let’s see an example:

index.php

The above code is vulnerable to SQL injection. A user can append an SQL code inside the email or message field and hack your website.

This is an example sql code a hacker can inject:

Now when the form is submitted the server will execute this SQL statement.
which will result in deleting the whole contacts table. So your website is hacked.

SQL injection attacks can be stopped by validating data, escaping data and running SQL code at low privilege. If we would have executed the above sql statement at low privilege than it wouldn’t have been able to delete the table. So we can change the script to this

Always remember to validate(string format and data type) and escape data And run SQL code at low privilege level.

OS Injection


OS injection is a technique where hackers can run OS command on server by injecting command to data sources.

Let’s see an example in which a website allows user to find ip of a domain name.
index.php

The above script is vulnerable to OS injection. A hacker can execute multiple other commands on server in this way


Now submitting this form will display all folders and files of the parent directory of the web root directory. In this way a hacker can execute almost any command and destroy your web site.

This kind of attacks can be prevented by data validation and running commands on server scripts with least privilege.

So we can change the script to this


Code Injections


Code Injection is a technique by which a hacker can execute code on the web server by injecting code to the data sources.

Let’s see an example of this:
index.php

The above script takes two numbers and creates a php code string and passing it to eval() for execution. The above script is vulnerable to code injection. A hacker can inject any php code and make it execute on the server.

This is how a hacker can inject code:



Now when the form is submitted all the information about your server is leaked.

You can prevent this kinds of code injection attacks by preventing use of eval() or validating the data. So we can change the script to this

Its always better to avoid use of eval().

File Inclusion


File inclusion is a technique by where a hacker can runs a remote or local script on the web server.

Let’s see an example of this:
index.php

The above code works fine by including a script related to the theme color of web site. But a hacker can easily exploit it and run any code on web server.

A hacker can inspect the html source code and pass value for color as .htaccess. Below picture shows a simple exploit of the above code



Now when the form is submitted the web page will display our .htaccess configuration file. Similarly you can change the value to any remote file link or local file link which will cause its execution.

This can be prevented by data validation. So we can change our script to this

Always be careful and validate data before using include(), file_get_contents() and require() in php to prevent file inclusion attacks.

XSS


XSS (Cross Site Scripting) is a technique by which a hacker injects client-side script into Web pages viewed by other users. This kinds of attacks are very common and needs to be dealt properly.

Let’s see an example of this kind of attacks:
index.php

A hacker can easily exploit this script and cause a code to run on client side. Putting script code or html source code inside the comment field will lead to XSS attack. Below image shows how a hacker can exploit it.



Now once this form is submitted, anyone who visits the site will see a alert box with a message “Hacked!!!”.

This kinds of attacks can be prevented by escaping the stored output. So we can change the script to this:


CSRF


CSRF (Cross Site Request Forgery) is a type of attack in which requests from user are sent to servers without the user knowing about it.

This kinds of attack are very popular in the internet. Let’s look at an example of this kinds of attacks.

index.php

money_transfer.php
The above code uses cookie to check if the user is logged in or not. If user is logged in then the money transfer is done. This scripts are vulnerable to CSRF attacks. A hacker can embed the above form in any website and send the link to the users and forcing some way to click on it. If the cookie is present then the money will be transfer to the hackers account.

Let’s see how this can be done (assume that user is logged in into bank website):
http://hackersite.com/earnmoney.html
This page link can be send to a user who is using bank website. And if the user clicks on the submit button on hackers website the given amount will be transferred which will lead to a disaster. So websites should’t depend on cookies to do critical things.

There are many ways to prevent such kinds of attacks. We will see the best and popular ones.
This kinds of attacks can be prevented by using HTTP Referer header, extra verification step or using special token

Lets see all the above preventing methods.

Preventing CSRF using HTTP Referer
Some browser allow to change HTTP Referer while requesting a link and also there are many other ways to change or break HTTP referer. So this method should be used along with other methods.

Preventing CSRF using special tokens
Every user will have a random secret token assigned to them whenever they make a request for the form and the token will be encrypted and hidden in the form. This token can only be used once and a new token is generated for every user for every new request for the form. And this token will have a expiry time of few minutes. While submitting the form, the form must have the user secret token. There is no way a hacker can find out the secret token of a user so cross site form submissions will not work.

There are many other factors that can be considered while generating this kind of tokens, this method is an simple and full proved way.

Extra Validation
You can use some extra validation steps before transfer money. These steps can be CAPTCHA validation, Re-Authentication (of password), DOB, mobile message verification etc.

By combining the above three methods we can get the best security possible against CSRF attacks.

Session Fixation


Session Fixation is a hacking technique by which a hacker can hijack a valid user session. There are many ways to hijack user sessions. Sometimes this happens by mistake or sometimes knowingly.

When cookies are disabled by browser, php passes session ids via GET. This is very dangerous. As you can sometime by mistake send this URL (URL containing session id) to a friend and he will hijacks your session by mistake. To prevent this kind of mistake session hijacking you can disable the passing of session id via GET.

This can be done in php.ini file.
php.ini
A hacker can steal your session id by intercepting traffic between user browser and web server. To prevent this you need to encrypt your website communication with server via SSL. So the hacker cannot steal it. A hacker can also hijack session by XSS attack. So preventing XSS attacks will also prevent session fixation.

Always regenerate session id on every request to the website so that a hijacked session id (if hacker has already hijacked in some other way) will become invalid. You can regenerate session id by using this function
You need to destroy the existing session whenever user logs out of your website.
These are some ways by which you can protect your website from session fixation.

Clickjacking


Clickjacking is a technique by which a attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both.

Let’s see the steps used by a hacker to achieve clickjacking:
Hacker creates a web page with some buttons on it aligned same as your website.
Loads your website inside a iframe.
Places the iframe on top of his web page.
Make the iframe transparent.
Now you won’t be able to see your website but it lies on top of hacker’s web page.
Users clicking on buttons will think that they are clicking on the normal visible web page buttons. But actually they are click on your website buttons.

This can be prevented by disallowing your website to be viewed inside a iFrame.

You need to insert this response header inside your httpd.conf file.
or you can insert this response header in your .htaccess file
You can also add this X-FRAME-OPTIONS header using PHP or any other server side language.

This is how you can prevent clickjacking.

Denial of Service Attack


This attack comes under platform based attacks. DOS is a technique by which a hacker consumes all the server resources so that users cannot access the site or the site will become slow. This is done basically by flooding your server with large number of requests.




To prevent this kind of attacks you can use services like cloudflare which provide DOS security to websites. Many hosting services also provide DOS security.

Man-in-the-middle attack


Man-in-the- middle attack is a method by which a hacker can intercept traffic between you and your website And also your website and your users.



Traffic between you and your website can be protected by the use of SSH instead of FTP.

Traffic between your users and website can be protected by using HTTPS instead of HTTP.

Conclusion

In this post I tried to cover all common types of attacks and ways to to prevent them. I will keep updating this post as new techniques arrives. Thanks for reading this post. “Like and Share”

Credit to here