DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL



Similar documents
SSL/TLS: The Ugly Truth

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

CS5008: Internet Computing

Is Your SSL Website and Mobile App Really Secure?

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

SSL/TLS and MITM attacks. A case study in Network Security By Lars Nybom & Alexander Wall

Project X Mass interception of encrypted connections

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

Penetration Testing for iphone Applications Part 1

Vulnerabilità dei protocolli SSL/TLS

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web Application Security

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Agenda. How to configure

Linux Network Security

Security + Certification (ITSY 1076) Syllabus

Ethical Hacking as a Professional Penetration Testing Technique

SBClient SSL. Ehab AbuShmais

Topics in Network Security

MANAGED SECURITY TESTING

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

The Secure Web Access Solution Includes:

Mobile Application Security

TLS/SSL in distributed systems. Eugen Babinciuc

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

SSL implementieren aber sicher!

CHAPTER 7 SSL CONFIGURATION AND TESTING

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Web Security: Encryption & Authentication

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SSL and Browsers: The Pillars of Broken Security

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

PCI Security Standards Council

Security Protocols/Standards

Breaking the Myths of Extended Validation SSL Certificates

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ERserver. iseries. Securing applications with SSL

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Setting Up SSL on IIS6 for MEGA Advisor

The Key to Secure Online Financial Transactions

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Lab VI Capturing and monitoring the network traffic

Using a VPN with CentraLine AX Systems

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

SSL: Paved With Good Intentions. Richard Moore

APPLICATION SECURITY AND ITS IMPORTANCE

That Point of Sale is a PoS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web Presence Security

Three attacks in SSL protocol and their solutions

Storage Cloud Infrastructures

Using a VPN with Niagara Systems. v0.3 6, July 2013

Application Security Testing

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Where every interaction matters.

Global Security Report 2011

2012 Global Threats and Trends

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Server Software Installation Guide

Workday Mobile Security FAQ

mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP The OWASP Foundation

Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

(WAPT) Web Application Penetration Testing

F5 BIG-IP V9 Local Traffic Management EE Demo Version. ITCertKeys.com

Cloud Security:Threats & Mitgations

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Security IIS Service Lesson 6

Introduction to the DANE Protocol

SSL EXPLAINED SSL EXPLAINED

Security Evaluation CLX.Sentinel

Lecture 11 Web Application Security (part 1)

CRYPTUS DIPLOMA IN IT SECURITY

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Preparing for GO!Enterprise MDM On-Demand Service

Malicious Network Traffic Analysis

Properties of Secure Network Communication

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

OPC UA vs OPC Classic

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Livezilla How to Install on Shared Hosting By: Jon Manning

The Evil Twin problem with WPA2-Enterprise. Ludwig Nussel SUSE Linux Products GmbH

ISM/ISC Middleware Module

Security Issues in Web Programming. Robert M. Dondero, Ph.D. Princeton University

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

Transcription:

DEF CON 19: Getting SSLizzard Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL

Agenda Introductions Primer / History: SSL and MITM Attacks Mobile SSL User Experience Research Motivations Research Implications Data Transmission Assault Course Components Introducing SSLizzard Mobile App Test Results Conclusions

Introductions Who are we? Nicholas J. Percoco (c7five) Head of SpiderLabs at Trustwave Started my InfoSec career in the 90s Paul Kehrer (reaperhulk) Lead SSL Developer at Trustwave Enjoys baking cakes in spare time.

Introductions What s this talk about? De-evolution of User Security Experience (in Mobile Devices) History and Types of SSL Attacks Lack of Testing Tools for Mobile Applications How Various App and Devices Perform Under SSL Stress A Tool Release to Help Solve this Problem

Primer / History: SSL and MITM Attacks What is SSL? Stands for Secure Sockets Layer Developed by Netscape in 1994 Implemented in Netscape Navigator 1.0 A protocol to secure a client->server data transmission Uses Asymmetric Keys to establish a Symmetric Key This happens during a handshake before actual data is transmitted

Primer / History: SSL and MITM Attacks Where is SSL (certs) Used? To Establish Secure Client to Server Communication Client Identity (User Authentication) Application Signing Log File Integrity

Primer / History: SSL and MITM Attacks How is SSL used in Mobile Devices? To Secure Communication Over Public Networks To Establish App to Server Communication App Code Signing (Android, IOS, BlackBerryOS) Mobile Device Management Profiles (Signed)

Primer / History: SSL and MITM Attacks What is a Man-in-the-Middle Attack? Injecting an Attacker between a Client and a Server Session. Attacker intercepts Client request to Server Attacker established a SECURE Session with Server Attacker established a UNTRUSTED Session with Client Attacker can then view / modified data between Client and Server

Primer / History: SSL and MITM Attacks What tools exist to help w/ MITM Attacks? thicknet MITM framework developed by Steve Ocepek (SpiderLabs) ettercap is a suite for man in the middle attacks on LAN arpspoof facilitates arp poising mitmproxy is an SSL-capable, intercepting HTTP proxy sslstrip relies on arpspoof then strips the SSL session to force Client to talk HTTP to attacker

Primer / History: SSL and MITM Attacks Why is true SSL MITM difficult? SSL certificates have a chain of trust Attacking public CAs not impossible, but not practical Self-Signed Certs throw Client errors Malformed Certs are difficult to generate

Mobile SSL User Experience No Standard UI Most Cases -> No UI At ALL! Cryptic Warming Messages Users Don t Know the Difference Pop-up could be BS

Research Motivations The Browser Community spent almost two decades tweaking the UI behavior when it comes to SSL The Mobile Device market destroyed that in less than five years There are no standards that today s mobile users expect to see when their data is transmitted via SSL

Research Motivations Most apps completely ignore the UI aspect of security There is zero functionality difference between an app that sends data in the clear vs. encrypted App developers need to pay attention to this, but also need tools to help them test SSL behavior easily and consistently

Research Implications Attackers are focusing more mobile app weaknesses If a popular app mishandles SSL, their users are more susceptible to attacks Credential Stealing Data Interception Response Manipulation These attacks will go unnoticed due to: Lack of User Awareness of the Risks Lack of UI Cues within Apps

Data Transmission Assault Course Components How do you build a test lab? Wireless Switch WRT-54GL running Tomato Firmware Attacker System Linux (must be connect via Ethernet to Switch) ettercapng-0.7.3 (w/ SpiderLabs patch) Victim Clients Android (Nexus S v2.3.4) ipod Touch 4 th Gen (v4.3.3)

Data Transmission Assault Course Components What types of SSL certs do you need? 1. Valid for Target Domain (i.e. www.myapp.com) 2. Various Malformed SSL Certificates: Null Prefix (big news in 2010) CRLF Self-Signed Signed by Parent Cert (set CA:FALSE) Invalid ASN.1 Structures (Fuzzing) Broken Encodings 3. A Method to Generate the Above Easily

Introducing SSLizzard - About SSLizzard is an open source toolkit to easily generate multiple types of invalid SSL certs for ANY given domain. The output is then used in various MITM frameworks to perform the SSL attack Successfully tested with ettercap (see patch on DVD) A thicknet module is being developed by Steve Ocepek. Can be used against any OS, Application or Browser.

Introducing SSLizzard Uses / Usage Command Line ruby sslizzard.rb mydomain.com Generates a key and a number of certificates with various invalid structures for testing. Output is written in the current working directory

Introducing SSLizzard Setup a Test Execute SSLizzard to generate certs Set up ettercap (patched) with x flag to specify cert type you want to test Use your app as normal and see if you get error msgs If you don t get errors, check ettercap to see if data was intercepted You will need to execute ettercap once per cert type generated by SSLizzard to comprehensively test

Introducing SSLizzard - Demo Generating a collection of certs Using the certs in ettercap (SpiderLabs patch) Video of interception of traffic Video of victim devices throwing errors/not throwing errors

Mobile App Test Results TO BE RELEASED AT DEF CON 19

Conclusions We need a world where: Developers use SSL for all data transmission Consistent, simple, UI that users can understand Apps and Devices that fail closed when there is a secure transmission problem

Trustwave s SpiderLabs SpiderLabs is an elite team of ethical hackers at Trustwave advancing the security capabilities of leading businesses and organizations throughout the world. More Information: Web: https://www.trustwave.com/spiderlabs Blog: http://blog.spiderlabs.com Twitter: @SpiderLabs

Questions?