- From: Brent Shambaugh <brent.shambaugh@gmail.com>
- Date: Sat, 26 Jan 2013 15:14:12 -0600
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: Web Payments <public-webpayments@w3.org>
- Message-ID: <CACvcBVpNDnBiCWp7-VkPQNDdMCrtRtw0z1p8HwtuTyjpsherCw@mail.gmail.com>
Books (cont.) Joel Scambray et. al, Hacking Web Applications Exposed, 2nd Ed. On Sat, Jan 26, 2013 at 3:00 PM, Brent Shambaugh <brent.shambaugh@gmail.com>wrote: > For what is worth, here are a few things I've found interesting, or would > like to learn more about: > > TCP/IP/HEX > > IBM Red Book: http://www.redbooks.ibm.com/abstracts/gg243376.html > Hexadecimal: http://en.wikipedia.org/wiki/Hexadecimal > - Hex Editor: http://en.wikipedia.org/wiki/Hex_editor > - Hex Dump: http://en.wikipedia.org/wiki/Hexdump > > > Patvera Maltego (network visualization used for social engineering) > > http://www.paterva.com/web6/products/maltego.php > > > Social Engineering Risks (the weakest link) > > - Social Engineering: > http://en.wikipedia.org/wiki/Social_engineering_%28security%29 > - Hacking the Human, Ian Mann > > > Rainbow Tables, Dictionary Attacks, Brute Force Attacks (for Cracking) > > https://en.wikipedia.org/wiki/Rainbow_table > https://en.wikipedia.org/wiki/Dictionary_attack > https://en.wikipedia.org/wiki/Brute_force_attack > > > Rainbow Series (Collection of infosec books) > > - https://en.wikipedia.org/wiki/Rainbow_Series > > > BackTrack Linux (penetration testing distribution) > > - http://www.backtrack-linux.org/ > > > Wireshark (packet analyzer) > > - http://www.wireshark.org/ > > > Network Security Conferences, such as: > > - DEFCON: https://www.defcon.org/ (curiously, no mention of the > semantic web) > - Blackhat: http://www.blackhat.com/ > > > Metasploit (platform for exploitation) > > - MetaSploit http://www.metasploit.com/ > - http://en.wikipedia.org/wiki/Metasploit_Project > > > SNORT (network intrusion detection and prevention) > > - http://en.wikipedia.org/wiki/Snort_%28software%29 > > > netstat (network statistics) > > - https://en.wikipedia.org/wiki/Netstat > > > ISO/IEC 27000-series (standards for information security) > > - https://en.wikipedia.org/wiki/ISO/IEC_27000-series > > > Books: > > The Network Security Bible, Eric Cole > > > Magazines: > > Phrack Magazine: http://phrack.org/ > > > > > > > > > On Fri, Jan 25, 2013 at 11:10 PM, Manu Sporny <msporny@digitalbazaar.com>wrote: > >> On 01/25/2013 09:02 PM, Manu Sporny wrote: >> > #4 is dangerous. JSON-LD does have a feature where it allows you to >> > load any other context from the Web. Those contexts can override >> > 'source' and 'destination'. >> >> Dave Longley and I just talked this attack vector through and it doesn't >> seem like it's a valid attack. Here's the attack in a nutshell: >> >> 1. A buyer is attempting to swap the source/destination fields on who >> gets paid for a particular asset. There are two places that they >> could corrupt the source/destination: the listing, the contract >> before payment is made. >> 2. The buyer finds a seller that is overlaying their own JSON-LD >> context and poisons the DNS that the seller is using to load their >> own context. The buyer's poisoned context swaps source/destination >> in the PaySwarm listing. >> 3. The buyer poisons the PA's DNS with their poisoned context that >> swaps source/destination in the listing and the PaySwarm contract. >> >> #2 fails because swapping source/destination in the listing creates an >> invalid payee for the digital good. The PaySwarm Authority will reject >> the listing because it doesn't contain a destination field. >> >> #3 fails because the PaySwarm Authority (and this part is implementation >> dependent) uses the listing to figure out who should be paid what, and >> the listing is invalid at this point. Even if the listing were valid, >> the poisoned JSON-LD context isn't applied until /after/ payment is >> made, so the money would still go to the right place. The poisoned >> JSON-LD context could still be written to the database with >> source/destination swapped, which would cause a transaction audit to >> fail, at which point the attack would be detected. >> >> So, a successful attack results in no monetary damage, but a corruption >> of the transaction record (that is easily detected and fixed). >> >> However, that this attack didn't work out is just a result of the way >> PaySwarm is designed. There could be other fields that the seller could >> sign in the future that would affect the flow of payment. So, it's >> probably best that we implement some sort of more heavy-weight >> requirement that all JSON-LD Contexts used in PaySwarm transactions MUST >> be loaded over HTTPS. This makes it so that implementers don't have to >> worry about this sort of attack vector at all, which will simplify >> implementations and lead to a tighter security model in general. >> >> I've raised an issue in the JSON-LD group to discuss the issue in more >> depth: >> >> https://github.com/json-ld/json-ld.org/issues/213 >> >> -- manu >> >> -- >> Manu Sporny (skype: msporny, twitter: manusporny, G+: +Manu Sporny) >> President/CEO - Digital Bazaar, Inc. >> blog: Aaron Swartz, PaySwarm, and Academic Journals >> http://manu.sporny.org/2013/payswarm-journals/ >> >> >
Received on Saturday, 26 January 2013 21:14:40 UTC