27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ivan Burke and Renier van Heerden<br />

Figure 5: Sites visited script<br />

Hashemian (2005), created a PHP script that can be accessed via JavaScript to perform IP resolution<br />

and reverse DNS lookups for visitors to sites. This provides more info on the location and domain<br />

usage of gadget user. Google’s makeRequest() function is also capable of performing a POST<br />

request. By combining these JavaScript information gathering techniques and posting capability of<br />

Google’s makeRequest() one can report back gathered information to Botherder. This is just some of<br />

the data that can be gathered using JavaScript and by no means covers all the data that can be<br />

harvested by JavaScript but for the purposes of this Proof of Concept they are sufficient.<br />

3.3 Adsense abuse<br />

Advertising companies offering website designers money for serving up adverts on their sites. By<br />

requesting pages using makeRequest() one can fool most Impression Based advertising models into<br />

counting the page fetch as an impression hence generating revenue for the website designer. Unique<br />

IP addresses have a higher weight on Advanced Impression Based advertising sites. Because<br />

Google Gadget Application servers make the request, only a select few IP addresses will in effect be<br />

displayed in advertising company logs. Hence, Adsense abuse is not really effective with Google<br />

Gadget API but it does guarantees a steady and constant number of visits to a site.<br />

3.4 Obfuscating source of attack<br />

Thus far it has already been stated that if the Google Feedfetcher is used to fetch remote data only<br />

the Google Gadget Domain Server's IP will be logged in the remote servers access logs. This is<br />

already an attempt to obfuscate the source of the attack. Unfortunately for Google gadgets to work<br />

and to be published Google needs to be able to access the gadget source code. This means that<br />

anyone wishing to add the gadget would also be able to fetch the source code and could possibly<br />

deduce that it executes malicious commands. A simple way of overcoming this obstacle is obfuscate<br />

the source code. By encoding the JavaScript source code in base64. Wang, (2009) developed a web<br />

tool specifically designed to obfuscate JavaScript. Figure 6 illustrates the result of obfuscating the<br />

hasLinkBeenVisited() function.<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!