2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.200
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers

Abstract: with the growing of network technology along with the need of human for social interaction, using websites nowadays becomes critically important which leads in the increasing number of websites and servers. One popular solution for managing these large numbers of websites is using shared web hosting servers in order to decrease the overall cost of server maintenance. Despite affordability, this solution is insecure and risky according to high amount of reported defaces and attacks during recent years. In this … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 5 publications
0
4
0
2
Order By: Relevance
“…Vasek et al [16] examined the effectiveness of sharing abuse data with web hosting providers to mitigate malicious online activities. Mirheidari et al [23] devised two attacks against web servers exploiting the improper isolation between files on shared web hosting servers. Also, in et al [24] outlined a comprehensive overview of common attacks on shared Web servers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Vasek et al [16] examined the effectiveness of sharing abuse data with web hosting providers to mitigate malicious online activities. Mirheidari et al [23] devised two attacks against web servers exploiting the improper isolation between files on shared web hosting servers. Also, in et al [24] outlined a comprehensive overview of common attacks on shared Web servers.…”
Section: Related Workmentioning
confidence: 99%
“…Mirheidari et al [23] devised two attacks against web servers exploiting the improper isolation between files on shared web hosting servers. Also, in et al [24] outlined a comprehensive overview of common attacks on shared Web servers. Correlation Analysis.…”
Section: Related Workmentioning
confidence: 99%
“…According to the authors, to be susceptible to such an attack, a PHP interpreter should be used as an Apache module because when Apache runs PHP interpreter as CGI, the new PHP interpreter process does not inherit the log file descriptor from Apache, so the malicious script cannot re-open the log file with a write access and alter its content. The sample PHP script for the log poisoning attack is provided in [13] and [14]. The authors emphasized that having write access to log files in shared web hosting leads to very dangerous situations where attackers would have a fertile environment to perform various attacks on the hosted websites.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Seperti adanya sosial media yang menggunakan teknologi website dengan berbagai jenis platform bahasa pemrograman, seperti PHP yang paling populer di kalangan penyedia layanan Web Hosting. Namun disisi lain banyaknya kejahatan cyber, seiring berkembangnya teknologi menjadi kompetisi di kalangan para cybercrime untuk menjadi yang paling unggul melakukan penetrasi website dan hasilnya diunggah pada situs (Zone-h arsip penyerangan digital, http://www.Zone-h.org) sebagai tanda telah berhasil [1].…”
Section: Pendahuluanunclassified
“…Metode yang berbeda dengan tujuan yang sama untuk mengamankan konfigurasi yang dapat diakses dari direktori lain, yaitu menggunakan suEXEC [1], merupakan sebuah fitur atau modul yang dapat disisipkan ke dalam sebuah web server, terutama Apache yang membuat semua script php yang dibuat dapat memiliki otoritas seperti Unix user. Contohnya, ketika akan membuat sebuah file tidak perlu mengganti otoritas file tersebut, karena pada fungsi PHP suEXEC dijalankan pada masing-masing user.…”
Section: Pendahuluanunclassified