Design a client side Code Generator for Generating an OTP to

advertisement
Design a client side Code Generator for Generating an OTP to Preventing
Password Phishing and Sniffing.
1
Mohammad Jawad Kadhim, 2 Mr. Ajendra Isaacs
M. Sc Scholar. Dept. of CS&IT, SHIATS – DU, Allahabad, India, Email: mu4su@yahoo.com
Assistant Professor. Dept. of CS&IT , SHIATS – DU, Allahabad, India, Email: davidisaacs2001@gmail.com
ABSTRACT
Hackers are constantly penetrating networks to stealing password,
personal and financial data in so many ways like Phishing,
Sniffing, social engineering and other methods.
In this paper we will discuss the ability of creating a Code
Generator in the Client Side to generate a one-time password to
reduce the possibilities of stealing password.
At first the web page will create password with two parts, the first
part will send directly to the user through a small software which
the user need to download it and install it in his PC, while the
second part will received by an SMS massage or email for one
time only and no need to send any SMS massage after that.
In merging the two parts in the Client side the new password will
generate, and in the same time the same password has been
generated in the web site.
This password are used only once, when you need to enter to your
page again you need to ask the software in your side to generate a
new password and that exactly happened when you logout from
your account in the sever side.
Index Terms
Phishing, Sniffing, Prevent Password Stealing, One Time
Password, OTP, Code Generator, Client Side Code Generator.
I. INTRODUCTION
Phishing and sniffing are the mostly used to steal password and
other authentication information.
In Phishing they spoofed e-mail messages that seem to come from
legitimate source. Trojans, malware and other malicious software
are also used for phishing attacks. Since, SMTP protocol does not
validate or authenticate the sender of the email; anyone can claim
to be a valid sender such as from banks, credit card companies and
other agencies. Cyber criminals make sure that the message
appears as trustworthy as possible that includes formats similar to
the legitimate message. By using such social engineering
techniques they are able to allure the victims to respond to those
messages.[1]
In the other hand, sniffing is that the attacker insert itself between
the two communicating host to obtain the message, And steal
passwords and personal information.
In Ethernet, when both sides of communication is sending message
they will need not only the network logical address but also the
network physical address. So it presents a problem how to get the
MAC address based on IP address, ARP protocol is used for
processing this problem[1]. The ARP table will keep the reflection
between the IP and MAC address and is updated unceasingly. The
network attacker using several spoofing method to attack the
network by the disadvantage of the ARP protocol and it has
seriously threaten the network security
In this paper, we will prevent the both attacks using a new
mechanism of implementing the onetime Password (opt).
The research has been done by PHP5 and MySQL for the server
side and VB.Net for the client side.
The structure of the paper is:
1- Section 2 provides a brief overview of the different types
of phishing and sniffing attacks.
2- Section 3 different phishing and sniffing techniques.
3- Section 4 presents an example that shows the mechanism
of preventing using the code generators..
4- Section 5 presents future work and concludes the article.
II. PHISHING & SNIFFING ATTACKS
II.I TYPES OF PHISHING ATTACKS
Phishing attacks are not limited to spoofed emails only; it includes
search engines, man-in-middle, malware, Trojans, instant
messaging, social networking sites and etc. Below are some major
categories of phishing.
II.I.I Clone Phishing
It is a type of an attack where a legitimate previously delivered
email containing an attachment o-r link has had its content and
recipient address (es) taken and used to create a cloned email.
The attachment or link within the email is replaced with a
malicious version and then sent from an email address spoofed to
appear to come from the original sender [6]. It may claim to be a
re-send of the original or an updated version to the original. This
technique could be used to pivot (indirectly) from a previously
infected machine and gain a foothold on another machine, by
exploiting the social trust associated with the inferred connection
due to both parties receiving the original email [7].
II.I.II Spear Phishing
It is a technique where specific victim is targeted. The information
about the victim is known prior to the attack and the email is sent
from the source known by the victim. Due to the nature of the trust
on receiving email, this kind of attack has high probability to be
successful. An example would be
II.II TYPES OF SNIFFING ATTACKS
II.II.I External network sniffing
Assuming host A and host B are in the same network and will
communicate with each other, the host C is out of the network,
Illustrated in Fig.1
Figure.1 External network sniffing.
If the attacker C wants to sniffing the communication content
between host A and host B, it must pass the router. Considering
the message survival time from inside net to outside net, the
attacker modifies its TTL of IP grouping to make sure it has
enough time sending out response package to the destination
host. The host C send out ARP response package to host A.
The format of the package is as Table1:
Destination
Source Mac
Source IP
Destination
MAC
Address
Address
IP Address
Address
0C-1C-2C-3C4C-CC
10.1.1.200
0A-1A-2A3A-4A-AA
10.1.1.100
Table 1 ARP response package send to host A.
When host A receives ARP response package it updates buffer,
after being spoofed host A send message to host B by the MAC
address of attacking host C. ARP is a LAN(Local Area
Network) protocol, for host is external network so host A can
not send message to router, at this time host C will update the
routing table of host A through ICMP(Internet Control
Message Protocol), it send the message which should send to
host B fist to router and then retransmit to attacker. So attacker
realizes the sniffing by this process. So does host B.[14]
II.II.II Internal network sniffing
Assuming that host A will communicate with host B, the
attacker C will sniffing the content of the communication.
Illustrated in Fig.2
Figure.2 Internal network sniffing
Based on knowing the IP address the attacker C can get the
MAC address of the host by collecting ARP request/response
message or by the PING command of ICMP protocol. The host
set NIC(Network Interface Card) as promiscuous state with
retransmitting function. The host C will carry on ARP
Spoofing and send response package to host A. The format of
the package is as Table 2:
Destination
Source Mac
Source IP
Destination
MAC
Address
Address
IP Address
Address
0C-1C-2C-3C4C-CC
10.1.1.200
0A-1A-2A3A-4A-AA
10.1.1.100
Table 2 ARP response package send to host A
For the disadvantage of the ARP protocol, the host A will
receive the response package constructed by host C and update
the ARP buffer, to avoid spoofing failure, host C must send out
ARP response package ceaselessly to keep proofing. With the
same principle host C send out ARP response package to host
B. The format of the package is as Table 3:
Destination
Source Mac
Source IP
Destination
MAC
Address
Address
IP Address
Address
0C-1C-2C-3C4C-CC
10.1.1.200
0B-1B-2B-3B4B-BB
10.1.1.100
Table 3 ARP response package send to host B.
The communication between host A and host B is interdicted
by the attacker, the attacker can receive and retransmit the
message of both sides without detecting. .[14]
III. PHISHING & SNIFFING
TECHNIQUES
III.I PHISHING TECHNIQUES
Many techniques are developed to conduct phishing attacks.
Malicious person with novice computer skills can use tools
which are available freely on the internet to conduct a
devastating phishing attack and make them less susceptible.
Web Spoofing is a method in which forged website looks
similar to the legitimate one so that users can enter their
confidential information. Email spoofing may occur in
different forms, but all have a similar result: a user receives
email that appears to have originated from one source when it
actually was sent from another source. Email spoofing is often
an attempt to trick the user into making a damaging statement
or releasing sensitive information (such as passwords) [8].
III.II.III. ARP based Sniffing
III.I.I Web Spoofing
Web Spoofing is a security attack that allows an adversary to
observe and modify all web pages sent to the victim's machine,
and observe all information entered into forms by the victim.
Web Spoofing works on both of the major browsers and is not
prevented by "secure" connections. The attacker can observe
and modify all web pages and form submissions, even when
the browser's "secure connection" indicator is lit. The user sees
no indication that anything is wrong [9].
Once this information is collected, the attacker can use it to buy
things with the victims' credit cards, access their bank
accounts, and establish false identities. Website spoofing is a
growing phenomenon, and puts consumers at considerable risk
for identity theft and credit card fraud [10].
This method works a little different. It does not put the network
card into promiscuous mode.
This is not necessary because ARP packets will be sent to us.
This is an effective method for sniffing in switched
environment. Here sniffing is possible due to of being stateless
nature of Address Resolution Protocol [15].
IV. Preventing password phishing & sniffing
There many techniques used to prevent password stealing; one
of them is the one time password (OTP) which also has
deferent mechanisms to implement.
In our paper we will use small software installed in the client
side to generate the OTP rather than using the SMS or Email
messages to transfer the OTP to the user in each time.
The process will go exactly as the next figure.
The attack is initiated when the victim visits a malicious Web
page, or receives a malicious email message. [9]
III.I.II E-mail spoofing
Email spoofing is email activity in which the sender address
and other parts of the email header are altered to appear as
though the email originated from a different source. Because
core SMTP doesn't provide any authentication, it is easy to
impersonate and forge emails [11]. Distributors of spam often
use spoofing in an attempt to get recipients to open, and
possibly even respond to, their solicitations. Spoofing can be
used legitimately. Classic examples of senders who might
prefer to disguise the source of the e-mail include a sender
reporting mistreatment by a spouse to a welfare agency or a
"whistle-blower" who fears retaliation [12].
Figure.3 accessing modes.
IV.I Getting
password).
an
account
(user
name
&
At first, the user needs to register himself in the web site by
giving the following information
The focus of this paper is to use the above mentioned
information to prevent the attacks using APPT.
III.II. SNIFFING TECHNIQUES
Three types of sniffing techniques are used:
III.II.I. IP Based Sniffing
IP based sniffing is the most commonly used method of packet
sniffing. In this method a requirement of setting network card
into promiscuous mode exist. When network card is set into
promiscuous mode then host will be able to sniff all packets. A
key point in the IP based sniffing is that it uses an IP based
filter, and the packets matching the IP address filter is captured
only.
Normally the IP address filter is not set so it can capture all the
packets. This method only works in non switched network
[15].
III.II.II. MAC based Sniffing
This is another method of packet sniffing. This is as like IP
based sniffing. Same concept of IP based sniffing is also used
here besides using an IP based filter. Here also a requirement
of setting network card into promiscuous mode exists. Here in
place of IP address filter a MAC address filter is used and
sniffing all packets matching the MAC addresses [15].
Figure.4 The Registering Interface of the website.
After pressing SUBMIT QUERY there are several actions will
occur:
a- Account creating and password generating.

The system will generate a password of two parts.

First part is generated from the entered data and
saved in the database. After that combine with the
execution file which the user needs to download and
install in his PC.

Second part is generated from a random number and
also saved in the database but before generating the
second part, the same random number will sent to the
user by SMS and EMAIL for once.
Figure.7 The code board interface in the client side code
generator illustrating the three codes needed.
Figure.5 Password Generating Stages.
b-
As you see, the software generate three encrypted codes by the
same algorithm of the main web site but in a different
environments. The next time we need to generate a new
password we only need to enter the numerical side of the
password rather than the code we received by the SMS and
Email and in our example the code is (3996).
After inserting this code the result will be:
Software downloading.
After an account has been created, the system will ask you
to download the Code Generator (CG).
This (CG) will be responsible of Generating:

OTP.

Confirmation Code.

PIN code.
IV.II Code Generation.
When the software installed, a small encrypted file will take a
place inside the PC. This small file contains the first part of the
password generated from the personal information of the user.
In starting the installed software, it will ask as to enter a code.
Figure.8 The next generating of codes after inserting a new
number.
IV.III Accessing the web site.
In most web sites, the login to the web site will done by the
user name and the password. But in our web site the
Confirmation code will generated and the user will asked to
compare it with the confirmation code in his side, if it’s match
then the PIN code is required, otherwise there is now way to
access the web site
Figure.6 The code inserting interface in the client side code
generator.
In the first time only we will use the code sent by an SMS and
Email but in the next times we will use the numeric side of the
generated password.
In that time the generation algorithm will generate the:

Password.

Confirmation Code.

PIN Code.
Figure.9 The authentication page of the web site after inserting
the user name and password and generating the confirmation
code and asking for PIN code.
http://brianpennington.co.uk/2013/01/30/rsas-januaryonline-fraud-report-2013-including-an-excellentsummary-of-phishing-in-2012/
[6] CSI ONSITE - Phishing techniques, Clone Phishing http://www.csionsite.com/2012/phishing/
Published:
March 12, 2012
[7] Clone Phishing - Phishing from Wikipedia, the free
encyclopedia, http://en.wikipedia.org/wiki/Phishing
Accessed: 20 February 2013 at 14:42
Figure.10 The code generator of codes display the same
confirmation code in figure 9.
IV.IV Preventing Password Phishing & Sniffing.
In the phishing and sniffing attack the main goal is to gain the
personal information like user names and passwords and use
them, but in our case we have the following scenarios:

If they steal the user name and password they don’t
have the confirmation code and the PIN code.

If they download the Code Generator, they will not
have the same information file.

If they steal our Code Generator or control our PC
remotely they don’t have the numerical part of the
password to generate the new password beside the
confirmation code and PIN code.
V. Conclusion.
Phishing and sniffing is two of the most powerful mechanisms
to steal information and used to hijack the accounts. There is a
lot of solution proposed to prevent these kinds of attacks but
until now the attacks are continuing.
This paper present different (OTP) generating mechanism to
prevent phishing and sniffing rather than the previous methods,
in this method we use a same algorithm to generate the same
OTP in a different sides and beside the OTP we propose more
security by an encrypted confirmation code and PIN code.
The future work will focus on creating a Code Generator for
the mobile phone for portable use and synchronize generations
with the PC Code Generator to provide the concept of using
this idea rather than the previous methods.
VI. REFERENCES
[1] Ahmed Alamgir khan. Preventing Phishing Attacks using
One Time Password and User Machine Identification.
International Journal of Computer Application. Volume
68.No. 3.April 2013.
[2] Why Phish Should Not Be Treated as Spam By Norman
M.
Sadeh
and
Ph.D.
http://www.drdobbs.com/security/why-phish-should-notbe-treated-as-spam/240001777, published May 18, 2012
[3] Computerworld QuickStudy: Phishing By Russell Kay,
http://www.computerworld.com/s/article/89096/Phishing
Accessed: 27 March 2013
[4] Koprowski, Gene J., “Beware of ‘Spoofing’ Scams,” UPI
Technology News, January 2004.
[5] RSA’s January 2013 Online Fraud Report,
[8] Cert Carnegie Mellon University, Spoofed Email,
http://www.cert.org/tech_tips/email_spoofing.html
Accessed: March 10, 2012
[9] Princeton University, Department of Computer Science,
http://sip.cs.princeton.edu/WebSpoofing Accessed: 09
March 2013
[10] Toni McConnel, Security Sentinel Website Spoofing 101
http://www.iapplianceweb.com/story/oeg20031028s0033
.htm Accessed: 09 March 2013
[11] Email spoofing From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Email_spoofing
Accessed:
March 11, 2012
[12] Posted by Margaret Rouse, Security: Email spoofing,
http://searchsecurity.techtarget.com/definition/emailspoofing Accessed: March 12, 2012
[13] Anti Phishing Working Group. Origins of the word
"phishing". http://www.antiphishing/org/word_phish.html.
Accessed: March 10, 2012
[14] Yang Liu, Kaikun Dong , Lan Dong, Bin Li. Research of the
ARP Spoofing Principle and Defensive Algorithm, Wseas
Transaction on Communication. ISSN: 1109-2742. Issue
5, volume 7, May 2008.
[15] Rupam1, Atul Verma2, Ankita Singh3. An Approach to
Detect Packets Using Packet Sniffing. International
Journal of Computer Science & Engineering Survey
(IJCSES) Vol.4, No.3, June 2013.
Download