The Attack
The fatal flaw that enabled the sensitive information to be stolen is possible when an end-user is not properly educated on an easy to do and well-known SSL exploit – SSL MITM.Here’s how it’s done:
The hacker goes to coffee shop and connects to the same Wi-Fi network you are connected to. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. The following diagram shows a very simplified graphic of how your SSL Banking session should work under normal conditions, then how it would work during an attack:
Figure 3
Figure 4
This is a bad thing if you have a “Fake” certificate being sent from the hacker, and you are actually connecting to his machine, not directly to the bank’s website. In this case, your credentials are being transmitted between your browser and the hacker’s machine. The hacker is able to grab that traffic, and, because he gave you the certificate to encrypt the data/credentials, he can use that same certificate to decrypt your data/credentials.
Here are the exact steps a hacker could use to perform this attack:
The first thing he would do is turn on Fragrouter, so that his machine can perform IP forwarding
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
With this information, he can now log into your Online Banking Account with the same access and privileges as you. He could transfer money, view account data, etc.
Below is an example of a sniffed SSL credit card purchase/transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card.
Figure 12
Also Real Bad News for SSL VPN Admins
This type of attack could be particularly bad for corporations. The reason for this is that Corporate SSL VPN solutions are also vulnerable to this type of attack. Corporate SSL VPN solutions will often authenticate against Active Directory, the NT Domain, LDAP or some other centralized credentials data store. Sniffing the SSL VPN login then gives an attacker valid credentials to the corporate network and other systems.What an End-User Needs To Know
There’s a big step and end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good”, valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:Figure 13
Figure 14
(Good Certificate) (Bad Certificate)
Figure 15
(Good Certificate) (Bad Certificate)
Figure 16
(Good Certificate) (Bad Certificate)
How an End-User Can Prevent This
- Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
- Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your Online Bank or the Online store.
- Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.
How a Corporation Can Prevent This
- Educate the end-user on the Security Alert and how to react to it.
- Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
- When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality.
Conclusion
This type of attack is relatively easy to do in a public Wi-Fi hotspot environment. It could also easily happen on a home Wi-Fi network, if that Wi-Fi network isn’t properly configured and allows a hacker to connect to that home network (See Essential Wireless Hacking Tools for more info on securing your home network). An educated end-user and sound security practices by corporations can protect your valuable data.
5 comments:
If you need the services of a certified ethical hackers LEGENDWIZARDHACKERS@GMAIL.COM are the best solution to your problems..They are extraordinary crackers, software developers and code breakers...LEGENDWIZARDHACKERS@GMAIL.COM They do what other hackers termed "Impossible" everything is possible with them... No matter how tough a database is, they break in with thier sets of software, thier priority is to deliver to thier clients with satisfaction and security. Thier jobs are 100% guaranteed.
contact them via:LEGENDWIZARDHACKERS@GMAIL.COM
They are legend and genius on the following problems:
*school Grade Changes hack
*Hack University grades and Transcripts
*Erase criminal records hack
*Databases hack
*Sales of Dumps cards of all kinds
*Individual computers hack
*Websites hack
*Control devices remotely hack
*Burner Numbers hack
*Verified Paypal Accounts hack
*Any social media account hack
*Android & iPhone Hack
*increase your credit score
*Text message interception hack
*email interception hack
*Increase blog traffic
*Skype hack
*Bank accounts hack
*email accounts hack
*Website crashed hack
* help Sign up for ILLUMINATI and get famous faster
*delete YouTube videos or increase views
*school transfer and certificate forgery
*server crashed hack
*Retrieval of lost file or documents
*Credit cards hacker
*loading of bitcoin
For more information contact their services team at
email: LEGENDWIZARDHACKERS@GMAIL.COM
so you can smile again
It really got to my notice that Samsung phones are not easy to break into like that but verifiedprohackers@gmail.com made it happen without trace.
This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:
-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change
Email: cybergoldenhacker at gmail dot com
Special thanks to (hackingsetting50@gmail.com) for exposing my cheating husband. Right with me i got a lot of evidences and proofs that shows that my husband is a fuck boy and as well a cheater ranging from his text messages, call logs, whats-app messages, deleted messages and many more, All thanks to
(hackingsetting50@gmail.com), if not for him i will never know what has been going on for a long time.
Contact him now and thank me later.
I had to leave this post here as a sign of gratitude since that is one of the least BRIXTON asked of me. From my calculations, I made $25,200 in 1-week trading but unfortunately lost it all after I tried to participate in an airdrop, I became very devastated until I read some wonderful reviews about WIZARD BRIXTON. I feel so much joy right now because BRIXTON did come through for me by getting my money back from those scam artists, my advice is for you to be mindful of the links you click online to avoid losing your money. The experience of losing your money to a scammer is not funny no matter how much. Feel free to ask me more hanswilton3@gmail.com or contact WIZARD BRIXTON via
EMAIL : WIZARDBRIXTON(AT) GMAIL (DOT) COM
WHATS-APPS : (+1- /807-23 ) 4-0428 .
Post a Comment