365-Day: HTTPS Cookie Stealing. Mike Perry Riverbed Technology DEFCON 2008



Similar documents
Topics in Network Security

Course Content: Session 1. Ethics & Hacking

Ethical Hacking as a Professional Penetration Testing Technique

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE


Web Application Report

Proxies. Chapter 4. Network & Security Gildas Avoine

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

FortKnox Personal Firewall

Detailed Description about course module wise:

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Configuration Manual English version

Casey Gowrie COMP116 Final Project. Session Hijacking and the Cloud Mentor: Ming Chow

What is Web Security? Motivation

An Insight into Cookie Security

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Learn Ethical Hacking, Become a Pentester

Security Protocols/Standards

Cross Site Scripting in Joomla Acajoom Component

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

CYBERTRON NETWORK SOLUTIONS

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies"

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Packet Sniffing on Layer 2 Switched Local Area Networks

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

CS5008: Internet Computing

Using a VPN with Niagara Systems. v0.3 6, July 2013

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Web application security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

1 Introduction. 2 Cafe Crack. 1.1 Rogue AP Attack. 1.2 Airsnarf. 1.3 Detecting Rogue APs. References Acronyms

FortiWeb 5.0, Web Application Firewall Course #251

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Linux Network Security

Internet Privacy Options

Breaking the Myths of Extended Validation SSL Certificates

Hosted Microsoft Exchange Client Setup & Guide Book

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Hack Proof Your Webapps

New Avatars of Honeypot Attacks on WiFi Networks

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Introduction to Computer Security Benoit Donnet Academic Year

Hosted Microsoft Exchange Client Setup & Guide Book


Honeypot that can bite: Reverse penetration

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

GoToMyPC Corporate Advanced Firewall Support Features

The Trivial Cisco IP Phones Compromise

Using a VPN with CentraLine AX Systems

How to Configure Captive Portal

Ethical Hacking Penetrating Web 2.0 Security

Breaking the Security Myths of Extended Validation SSL Certificates

Wireless Security: Secure and Public Networks Kory Kirk

Regain Your Privacy on the Internet

Magento Security and Vulnerabilities. Roman Stepanov

Own your LAN with Arp Poison Routing

Information Security. Training

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Criminal charges are not pursued: Hacking PKI

Penetration Testing for iphone Applications Part 1

Deploying Secure Internet Connectivity

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Testing the OWASP Top 10 Security Issues

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

April 11, (Revision 2)

Footprinting and Reconnaissance Tools

ShoreTel Advanced Applications Web Utilities

HackMiami Web Application Scanner 2013 PwnOff

Check list for web developers

Securing Secure Browsers

SSL and Browsers: The Pillars of Broken Security

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Attack Frameworks and Tools

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Wireless Network Best Practices for General User

Lab VI Capturing and monitoring the network traffic

Penetration Testing with Kali Linux

Security of IPv6 and DNSSEC for penetration testers

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

WiFi Security Assessments

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

The Hidden Dangers of Public WiFi

Transcription:

365-Day: HTTPS Cookie Stealing Mike Perry Riverbed Technology DEFCON 2008

Who am I? Volunteer Tor developer Work on Torbutton, TorFlow Privacy advocate, censorship opponent Forward+Reverse Engineer at Riverbed Flexitarian Random Hacker Wrote a page-based malloc debugger Wrote an IRC bot that got quoted as a human in a major magazine

Why am I doing this? Exploit is not new or complicated... However: Vector is not narrow or wifi-only Sophisticated attackers can drain bank accounts with custom cable/dsl modems It also harms safe Tor usage, and that pisses me off Many sites are vulnerable, and don't seem to care. Response: Release a tool showing how bad this is Basic Proof of concept mechanisms did not work Encourage (correct and secure) SSL adoption It's a ONE BIT FIX PEOPLE!

Cookie Basics Variables set by websites in your browser Used for authentication, tracking, storage Several properties that govern when transmitted Domain Path Expiration SSL bit (seldom used, this is where the fun begins)

The 'SideJacking' Attack Glorified sniffer Sniffs cookies transmitted via plaintext http Janky proxy based approach to do control+saving Completely passive: User must visit target site Able to save domain and path info Path info may be too specific Can lead to issues Admirable PR machine for such a simple hack Waay exceeds my PR abilities. Little help? :)

Active HTTP Cookie Hijacking Like CSRF, but we want the data transmitted, not any particular result In fact, the server can reject the request Scenario: Yesterday: User logs in to mail.yahoo.com. Checks "Remember me." Today: User visits www.cnn.com via open wifi Today: We inject <img src="http://mail.yahoo.com"> Today: Browser transmits yahoo cookies for image Today: We sniff cookies, write them to cookies.txt Tomorrow: Use cookies.txt to read their mail

Active HTTPS Cookie Hijacking New Scenario: Yesterday: User logs in to https://mail.google.com Today: User visits www.cnn.com via open wifi Today: We inject <img src= http://mail.google.com/mail"> Today: Browser transmits unprotected gmail GX cookie for http image fetch Today: We sniff cookies, write them to cookies.txt Tomorrow: Use cookies.txt to read their mail User never even checks gmail on hostile network!

Vectors Not just open wifi ARP poisoning DHCP spoofing Dan Kaminsky's DNS Hijacking Attack DSL+Cable modem networks? Possible to sniff+inject on cable networks? Sometimes DOCSIS encryption, but many modes are weak May require two modems One custom with TX/RX frequencies switched Or custom software modem! (Guy Martin's talk)

'Manual' Attack Aka: How people were owned for the past 365 days. Fire up wireshark Fire up airpwn/netsed with custom rule Copy cookies out of wireshark. Lame.

Introducing CookieMonster Fully automated pylorcon tool for cookie gathering Caches DNS responses Listens for 443 connections Uses cache to map IP to domain name Stores IP+host into injection queue Next time IP connects to ANY http website: Inject <img src= http://dnsname > Gathers any resulting cookies and writes cookies.txt file for use in Firefox 2

Ok, so there is some configuration.. Need cookie path for injection for some sites No worries. List of paths for popular sites provided! Might want to steal other non-ssl sites too No worries. Additional target list can be provided!

Feed the Monster Some COokies!1!

Much Better

Bonus: (>?)40% of Internet's Gmail! 1. Search for 'CAU metasploit DNS hijack' 2. Scan for vulnerable DNS servers (>40% of net) 3. Hijack *.google.com to point to your transproxy 4. Inject http://mail.google.com imgs into www.google.com welcome page 5. Modify CookieMonster to only passively collect cookies at your IP (2 line change) 6.??? 7. PROFIT!

How to Protect Yourself Now Use ForceHTTPS Firefox addon (complicated) Use Gmail HTTPS pref (if available) Log out when done Clear cookies regularly

Thanks Damon McCoy for additional cards+headers Colin Jackson for ForceHTTPS and other work Nick Weaver for suggestions and correspondence LORCON, pylorcon, dpkt teams/authors