F24 Lab 6 Cross Site Attacks
F24 Lab 6 Cross Site Attacks
Web applications are critical component of our lives, society, and economy. Consequently, their
security is important – but also, as we will see, challenging. In this lab, we will learn some basic
topics of web security, focusing on (security against) attacks by rogue websites, including two of
the most important attacks: Cross-site scripting (XSS) and Cross-Site Request Forgery (CSRF),
and basic defenses filtering and tokens. We will also learn about cookies, an essential component
of web programming that we didn’t cover yet, which is important for both security and privacy.
Both attacks we will see are related to cookies.
You can learn more about web security and privacy in CSE 4402 – and from many excellent online
sources (websites) and books.
Throughout this lab you’ll need to access the same banking website as in Lab 4. As a reminder,
this website is located at 10.13.4.90. You need to use SSH tunneling as described in Lab 0 to
access.
In the file Q1login in the Lab6 folder of your VM, you will find two (username, password) pairs
(both meant for you to use); one begins with the letter A (for attacker) and the other with the
letter B (for benign user).
Open our `bank’ site (http://bank.com), and login to the ‘B’ user. You will be now `logged in’
and be able to transfer money to other accounts; this is facilitated by a cookie sent by the
server to your browser. Find the cookie(s) that your browser received from bank.com. This
information can be found directly from your browser, using its user interface; the method is
browser-specific but not hard to find. For our Husky Banking website, the cookie used to
maintain a “logged in” state is the LOGIN_INFO cookie.
Submit to the autograder: the value of the LOGIN_INFO cookie you found.
Submit in your lab report document in HuskyCT: the pair of usernames you picked (‘A’ and ‘B’),
and the details of the cookie you received after login to the `B’ user; include and explain these
details in text and include a screen shot of the browser dialog which provided this information.