Hi Everyone, as mentioned in my introduction post, BOTL needs quite a bit of updating, patching and whatever else I might come across. Over the next few weekends BOTL may be unreachable on occasion as I do migrations or updates, etc. Just be patient - we'll be back! I'll generally try to keep these maintenances until later in the evenings.
Great. If the white hats are telling people about it now, you know the others have been using it for a while. The Google and PSN hacks are legendary already, but before that I'm sure it was being used for simple theft.
The way I see it, there is no such thing as total security. If someone wants in bad enough, they'll probably get in. Of course, I do what I can to deter the casual attempts, but that's about all I can do.
Except that slipping a bit of javascript into one's browser is not as simple as it sounds.“BEAST is like a cryptographic Trojan horse – an attacker slips a bit of JavaScript into your browser, and the JavaScript collaborates with a network sniffer to undermine your HTTPS connection,”
I did read it, as well as a few other articles on the topic, and frankly I'm still having a hard time imagining how this affects the majority of internet users.just read the article, man. it'll take you five minutes. its not too tough to imagine how this could affect internet users.
In post #7 I lay out why this is much easier said than done. It's like saying I can figure out your bank card PIN, all I need is to slip a card into your wallet and tap your phone line. It's a neat trick, but not something I'm worried about.BEAST is like a cryptographic Trojan horse an attacker slips a bit of JavaScript into your browser, and the JavaScript collaborates with a network sniffer to undermine your HTTPS connection,
Bingo! There are always new hack and new updates majority of people don't hear about. I listen to securityNow with steve gibbson podcast on the twit network. They discussed this back on April 07, if you want to listen or read the transcript here's the link. It's the last thing disscussed on the show.This is how encryption goes. We ride one until it gets broken then move on to the next level. There really is a limitless amount of how much encryption you want to put on something, its just the larger you go the more it will cost due to larger data taking more time.
Here's a place to start. Charles I think you're close but probably have to be in the middle first, thats how you get your payload to your victim.Alright, so let's walk through the attack. Let's imagine a scenario where the attacker has both access to the cyphertext on the wire, as well as the ability to to inject data into an HTTP stream. It's a bit of a tall order, but theoretically something you can pull off with ARP spoofing, or by compromising a proxy or router somewhere.
How do you leverage that to launch the sort of attack they're describing? JavaScript's same-origin policy will preclude you from generating traffic to arbitrary SSL site to launch the actual attack, so that's a non-starter. You need a way to get the malicious code onto the actual web site you want to steal session credentials for. Since we've already established they're using SSL, I think we have to abandon entire approach.
Perhaps we can try to sneak the code in via a malicious advertisement or some such? That would get your agent into the browser in the appropriate security context, but it does nothing toward getting you access to the cyphertext. In this scenario the difficulty would be in situating yourself such that you could observe the network traffic AND target the user whose traffic you're watching. This is a VERY tall order in most real world scenarios.
It's entirely possible I'm completely missing something important, but it seems like the overwhelming majority of internet users don't need to worry about this.
-Charles
I think arp spoofing or physically inserting yourself into the path of a wired network would have made for a simpler example, but I do like your style.What do you think?
Agreed. Once you can generate trusted certificates all bets are off. At that point your hypothetical squid proxy can pretend to be anyone, SSL or not.Personally I think it's even more scary when something like this happens.
Supposedly a couple of the certs stolen were for M$ and M$ Update. Not to mention several Governments sites.
http://www.infoworld.com/t/cyber-crime/debacle-deepens-hacked-ssl-certificates-issuer-171711
Happy Browsing :ccool: