在ASP.NET MVC中如何预防Cookie的窃取攻击(转载)
Cookie
Cookie is a small piece of data sent by a web server to a web browser. The browser stores this data in a text file. This data is sent by the browser to the web server each time it requests a page from that server.
Cookies store information like your site preferences or history so that they can customize the page for you, every time you request it. So that information is usually not what attacker cares about. Cookies are also used to store information that uniquely identify the user such as the Authentication Ticket. That's more luring to the attacker 😉 If the attacker can steal someone's authentication cookie they can simply get access to the complete account.
Cookie Stealing using XSS
In order to steal the cookie, the attacker can write a script which reads all the cookies and sends it to the attacker. If you search about it on google, you can find plenty of scripts that read all the cookies and send it to a specific server. I also discussed about XSS attack in my previous blog post here. If the site is XSS vulnerable, the attacker's task is made easy. He can simply get the script executed on anyone's machine and get all the cookies.
Once the attacker gets the authentication cookie, he can copy the Session Id/ Username, etc and plug that information into his own browser and get access to the victim's account. Isn't it simple?
How to Prevent?
In order to prevent the scripts to access the cookies we need to set the flag called HttpOnly to true. This allows the scripts to be accessed only by Http and disables all kinds of script access. We can set this flag at the application level in system.web section in web.config like this:
<httpCookies domain="" httpOnlyCookies="true|false" requireSSL="true|false" />
If we need to set it at per cookie level, we can set it like this:
Response.Cookies["ImpCookie"].HttpOnly=true;
Conclusion
Cookies can store valuable information and should be protected. We should set the cookie access to HttpOnly in order to prevent their access from malicious scripts.
扩展
原文地址
On the system.web/authentication/forms element:
requireSSL = true.
This requires that the cookie only be transmitted over SSL
slidingExpiration = false.
When true, an expired ticket can be reactivated.
cookieless = false.
Do not use cookieless sessions in an environment where are you trying to enforce security.
enableCrossAppRedirects = false.
When false, processing of cookies across apps is not allowed.
protection = all.
Encrypts and hashes the Forms Auth cookie using the machine key specified in the machine.config or web.config. This feature would stop someone from hacking their own cookie as this setting tells the system to generate a signature of the cookie and on each authentication request, compare the signature with the passed cookie.
If you so wanted, you could add a small bit of protection by putting some sort of authentication information in Session such as a hash of the user's username (Never the username in plain text nor their password). This would require the attacker to steal both the Session cookie and the Forms Auth cookie.