19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13 n Attacking Users: O<strong>the</strong>r Techniques 541<br />

visit a different URL than <strong>the</strong> one requested. These vulnerabilities usually are<br />

of much less interest to an attacker than cross-site scripting, which can be used<br />

to perform a much wider range of malicious actions. Open redirection bugs<br />

are primarily of use in phishing attacks in which an attacker seeks to induce a<br />

victim to visit a spoofed <strong>web</strong>site and enter sensitive details. A redirection vulnerability<br />

can lend credibility to <strong>the</strong> attacker’s overtures to potential victims,<br />

because it enables him to construct a URL that points to <strong>the</strong> au<strong>the</strong>ntic <strong>web</strong>site<br />

he is targeting. Therefore, this URL is more convincing, and anyone who visits<br />

it is redirected silently to a <strong>web</strong>site that <strong>the</strong> attacker controls.<br />

That said, <strong>the</strong> majority of real-world phishing-style attacks use o<strong>the</strong>r techniques<br />

to gain credibility that are outside <strong>the</strong> control of <strong>the</strong> <strong>application</strong> being targeted.<br />

Examples include registering similar domain names, using official-sounding subdomains,<br />

and creating a simple mismatch between <strong>the</strong> anchor text and <strong>the</strong> target<br />

URLs of links in HTML e-mails. Research has indicated that most users cannot<br />

or are not inclined to make security decisions based on URL structure. For <strong>the</strong>se<br />

reasons, <strong>the</strong> value to phishermen of a typical open redirection bug is fairly marginal.<br />

In recent years, open redirection vulnerabilities have been used in a relatively<br />

benign way to perform “rickrolling” attacks, in which victims are unwittingly<br />

redirected to a video of British pop legend Rick Astley, as illustrated in Figure 13-5.<br />

Figure 13-5: The result of a rickrolling attack

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!