27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ivan Burke and Renier van Heerden<br />

Figure 7: Botnet Gadget<br />

In the remainder of this Section we discuss the attacks we added to our PoC Botnet Gadget and we<br />

discuss some of the information obtained by our Botnet Gadget.<br />

We used the JavaScript function provided by Cabri (2007) to extract user history information such<br />

which Social network site the gadget user has visited and which bank he or she uses. Cabri’s (2007)<br />

script can only determine if a site has been visited hence it is an exaustive search, hence we scanned<br />

though a targeted list of URLs for information we were interested in. We used JSON IP Adress<br />

recovery script provided by (Bullock, 2010), to determin gadget user IP Time zone and general<br />

geographical location using the retrieved IP.<br />

Figure 8: Sample of JSON IP recovery script<br />

To determine if the gadget user has auto login for social network sites we create hidden iFrames to try<br />

and access logged in content of social media sites. We queried the iFrame content to determine<br />

whether the iFrame was redirected to Login page or whether it could access the content. This data<br />

along with IP and history data was posted back to our own remote server using Google’s<br />

makeRequest() function.<br />

For a denial of service attack we used one of our own servers and requested fictitious pages from it<br />

using makeRequest() function. We placed fetch request in a n endless loop that generated<br />

39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!