SlideShare a Scribd company logo
© Digital Security
MITM Attacks on HTTPS:
Another Perspective
Alexey GreenDog Tyurin
@antyurin
© Digital Security 2
MITM Attacks on HTTPS: Another Perspective
About me
• Pentester
• Security researcher
• WEB/Java/Network security fun
• EasyHack for “Xakep”
• Co-organizer ZeroNights
• Co-organizer Defcon Russia 7812
© Digital Security 3
MITM Attacks on HTTPS: Another Perspective
HTTPS
• TLS (SSL)+ HTTP
• Protects against man-in-the-middle attacks
• Authentication, Encryption, Integrity – Silver bullet ?
• Crypto attacks:
- POODLE, BEAST, CRIME… Hard to exploit
© Digital Security 4
MITM Attacks on HTTPS: Another Perspective
TLS specifics
• Knows nothing including protocol:
HTTP/SMTP/POP3/TDS/…+TLS TLS
HTTP

Recommended for you

OWASP San Diego Training Presentation
OWASP San Diego Training PresentationOWASP San Diego Training Presentation
OWASP San Diego Training Presentation

The document provides an overview of web application security topics like SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), file inclusion, and tools/techniques for exploiting vulnerabilities. It discusses basic web communication, HTTP methods, response codes, URLs, database communication. It also covers setting up a Kali Linux environment, Firefox plugins, exploiting XSS vulnerabilities, defending against attacks, and includes exercises on vulnerable web apps.

trainingowasppentesting
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)

video demos: http://whitehatsec.com/home/assets/videos/Top10WebHacks_Webinar031711.zip Many notable and new Web hacking techniques were revealed in 2010. During this presentation, Jeremiah Grossman will describe the technical details of the top hacks from 2010, as well as some of the prevalent security issues emerging in 2011. Attendees will be treated to a step-by-step guided tour of the newest threats targeting today's corporate websites and enterprise users. The top attacks in 2010 include: • 'Padding Oracle' Crypto Attack • Evercookie • Hacking Auto-Complete • Attacking HTTPS with Cache Injection • Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution • Universal XSS in IE8 • HTTP POST DoS • JavaSnoop • CSS History Hack In Firefox Without JavaScript for Intranet Portscanning • Java Applet DNS Rebinding Mr. Grossman will then briefly identify real-world examples of each of these vulnerabilities in action, outlining how the issue occurs, and what preventative measures can be taken. With that knowledge, he will strategize what defensive solutions will have the most impact.

grossmansecurityhacking
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection

Given at black hat and DEF CON 2010 by Wayne Huang and team. https://www.defcon.org/html/defcon-18/dc-18-speakers.html#Huang http://www.blackhat.com/html/bh-us-10/bh-us-10-briefings.html#Huang DRIVESPLOIT: CIRCUMVENTING BOTH AUTOMATED AND MANUAL DRIVE-BY-DOWNLOAD DETECTION This year saw the biggest news in Web security ever--Operation Aurora, which aimed at stealing source code and other intellectual properties and succeeded with more than 30 companies, including Google. Incidence response showed that the operation involved an IE 0-day drive-by-download, resulting in Google's compromise and leak of source code to jump points in Taiwan. The US Government is so concerned that they issued a demarche to the Chinese government. Using real, live examples, we will show how easy it is to exploit injection-based, XSS-based, and CSRF-based vulnerabilities in FaceBook, Google, Digg, LinkedIn, and other popular websites, and inject drive-by downloads. If drive-bys are so easy to inject into high-traffic websites, then the question becomes, how easy it is to make them undetectable by automated malware scanning services (such as Google's) and by human manual inspection? We will demonstrate how easy it is to defeat automated detection mechanisms and overview commonly used techniques. We will reveal for the first time, in this conference, some very advanced techniques that are almost impossible to overcome by automated analysis in the past, now, and in the future. We will release Drivesploit, a drive-by download exploit framework implemented on top of Metasploit. We will go into depth on two particular techniques supported by Drivesploit's a) javascript obfuscation based on behavior-based fingerprinting, and b) javascript timelock puzzles. We will have live demos to show how this technique easily defeats both automated AND manual detection. At the very beginning of our talk, we will be giving out a digg.com page, which we have infected with a drive-by download created with Drivesploit. Visiting this page with the right browser will trigger the exploit and download a malware that steals browser cookie files. The whole process will be undetectable by antivirus. The actual javascript drive-by code contains a secret phrase. We will give out an ipad to whomever from the audience that is able to correctly deobfuscate the javascript and give out the secret phrase. Finally, we will present case studies on systems and processes that the largest organizations have put in place in order to fight against Web-based malware. We will also present case studies of our incidence response efforts with organizations hit by Web malware injections such as Google's aurora incident. Based in Taiwan, Co-speaker Wayne has been personally involved in such incidence response efforts since the late 90's. All source codes related to POC exploits against FaceBook, Google, Digg, LinkedIn, etc, as well as source code of Drivesploit, will be released as open source at the conference. Attendees will gain the following: 1. Understanding of drive-by downloads and associated terminologies. 2. Information about various drive-by download infection vectors. 3. Appreciation of tools helpful for drive-by analysis, including Malzilla, spikermonkey, rhino, burp and wepawet 4. Realize why drive-by downloads are hard to analyze and detect. Why antivirus fail, why behavior-based approaches fail, and why even manual efforts are difficult 5. Learning the Drivesploit framework and how it can be used to develop poc drive-bys 6. Learning two new deadly techniques: behavior-based browser finterprinting and javascript timelock puzzles 7. Learning how to implement above two using Drivesploit to defeat both automated and manual drive-by analysis 8. Knowledge about the available countermeasures to this threat

exploithackingdrive-by download
© Digital Security 5
MITM Attacks on HTTPS: Another Perspective
TLS specifics
• Application layer
• Knows nothing about underlying protocol
• Doesn’t protect against destination changing (IP, port)
IP
TCP
TLS
HTTP
© Digital Security 6
MITM Attacks on HTTPS: Another Perspective
TLS specifics
• Authentication using x509 certificates
• Client compares server name and SAN field of certificate
© Digital Security 7
MITM Attacks on HTTPS: Another Perspective
Certificates features and limitations
• Doesn’t care about port (many services – 1 certificate)
• For a wide range of domain names:
• Many names in SAN - Subject Alternative Name (+ CN*)
• Wildcard certificate
• No SNI
• TLS cache **
• HTTP/2 connection sharing**
*Since 58, Chrome doesn’t check CN, only SAN (because of RFC)
** http://antoine.delignat-lavaud.fr/doc/www15.pdf
© Digital Security 8
MITM Attacks on HTTPS: Another Perspective
Wildcard names

Recommended for you

Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites

This presentations is about pentesting AEM web applications. It have been shown on PHDays security conference.

aem pentesting phdays
Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014 Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014

Major news in the month included unrest in Turkey and a coup in Thailand. Ebay was hacked and fake user databases were sold. The USA charged five Chinese nationals with cyber espionage. Memory issues caused failures in an air traffic control system. Interesting tools released included ones for bypassing two-factor authentication and exploiting ad networks. Heartbleed continued to be analyzed and disclosed vulnerabilities in certificate authorities.

DEfcon15 XXE XXS
DEfcon15 XXE XXSDEfcon15 XXE XXS
DEfcon15 XXE XXS

The document discusses security challenges with service-oriented architectures (SOA) and web services. It introduces SOA, web services, and web 2.0, and describes the growing adoption of these technologies. It then presents the XML/SOA threat model, which includes payload/content threats that target back-end systems or end users, XML misuse/abuse through injection and structure manipulation attacks, and infrastructure attacks. Examples of specific attacks are provided like SQL injection, XML entity expansion attacks, and denial of service attacks.

© Digital Security 9
MITM Attacks on HTTPS: Another Perspective
A lot of names in SAN
© Digital Security 10
MITM Attacks on HTTPS: Another Perspective
TLS Redirection
• Group of MitM attacks – misuse of authentication limits and features
• Any protocol
• Virtual host confusion (http://antoine.delignat-lavaud.fr/doc/www15.pdf)
© Digital Security 11
MITM Attacks on HTTPS: Another Perspective
Simplest example
• Attacker (A) controls files on HostB
• A. uploads own new_version.exe on HostB
• Autoupdate on Victim (V) requests a new version of software:
https://www.correct.com/new_version.exe
• A. MitMs and redirect to HostB
• Autoupdate downloads and runs A’s exe file
© Digital Security 12
MITM Attacks on HTTPS: Another Perspective
Requirements
• HostA and HostB have different IP (or ports)
• HostB has an x509 certificate
with the domain name of HostA in SAN

Recommended for you

When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the masses

Conference: InsomniHack (21 March 2014) Talk speakers: Michele Orru (@antisnatchor) Krzysztof Kotowicz (@kkotowicz) Talk abstract: A bag of fresh and juicy 0days is certainly something you would love to get as a Christmas present, but it would probably be just a dream you had one of those drunken nights. Hold on! Not all is lost! There is still hope for pwning targets without 0days. We will walk you through multiple real-life examples of client-side pwnage, from tricking the victim to take the bait, to achieving persistence on the compromised system. The talk will be highly practical and will demonstrate how you can do proper client-side exploitation effectively, simply by abusing existing functionalities of browsers, extensions, legacy features, etc. We'll delve into Chrome and Firefox extensions (automating various repetitive actions that you'll likely perform in your engagements), HTML applications, abusing User Interface expectations, (Open)Office macros and more. All the attacks are supposed to work on fully patched target software, with a bit of magic trickery as the secret ingredient. You might already know some of these exploitation vectors, but you might need a way to automate your attacks and tailor them based on the victim language, browser, and whatnot. Either way, if you like offensive security, then this talk is for you.

michele orrukrzysztof kotowiczxss
Hunting for security bugs in AEM webapps
Hunting for security bugs in AEM webappsHunting for security bugs in AEM webapps
Hunting for security bugs in AEM webapps

Presented on Hacktivity 2018 conference - https://www.hacktivity.com/bug-hunting-adobe-experience-manage.

aempentestinghacking
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed

This document introduces Web Application Firewall (WAF) and discusses techniques for bypassing WAF protections, including SQL injection, cross-site scripting, file inclusion, HTTP parameter contamination, and HTTP pollution attacks. It provides examples of bypassing specific WAF vendors and open source WAFs like ModSecurity and PHPIDS. While WAFs can block some attacks, the document argues they cannot eliminate all vulnerabilities and proper secure coding is still needed. It concludes that WAFs may succeed or fail depending on configurations and imaginative attacks.

© Digital Security 13
MITM Attacks on HTTPS: Another Perspective
Requirements
• Depends on a situation:
• When a request for HostA comes to HostB, there is no such a value in virtual hosts of HostB
webserver, HostB serves default domain.
© Digital Security 14
MITM Attacks on HTTPS: Another Perspective
Requirements
• A. controls something in user’s requests or server’s responses
© Digital Security 15
MITM Attacks on HTTPS: Another Perspective
Level of control
What can A. control with the help of a server’s response (with focus on HTTPS):
• Nothing
• Parts of response (some values in body)
• Full body of a specific URL.
• Full body of any URL.
• Full control (header, body) w/o access to TLS key.
© Digital Security 16
MITM Attacks on HTTPS: Another Perspective
Common example – XSS
XSS on HostB (Part of body)
1. V. request to HostA + xss of HostB
https://www.correct.com/xss_of_hostb_here
2. A. MitMs and changes an IP
3. HostB responses with A’s JS
- V. executes JS (context of HostA)
- A. stops the MitM attack
4. JS can interact with HostA in a usual
way
Browser knows nothing about MitM!

Recommended for you

Same Origin Policy Weaknesses
Same Origin Policy WeaknessesSame Origin Policy Weaknesses
Same Origin Policy Weaknesses

http://www.powerofcommunity.net/pastcon_2008.html & http://xcon.xfocus.org/XCon2008/index.html The Same Origin Policy is the most talked about security policy which relates to web applications, it is the constraint within browsers that ideally stops active content from different origins arbitrarily communicating with each other. This policy has given rise to the class of bugs known as Cross-Site Scripting (XSS) vulnerabilities, though a more accurate term is usually JavaScript injection, where the ability to force an application to echo crafted data gives an attacker the ability to execute JavaScript within the context of the vulnerable origin. This talk takes the view that the biggest weakness with the Same Origin Policy is that it must be implemented by every component of the browser independently, and if any component implements it differently to other components then the security posture of the browser is altered. As such this talk will examine how the 'Same Origin Policy' is implemented in different circumstances, especially in active content, and where the Same Origin Policy is not really enforced at all.

xsssop
JavaScript Security
JavaScript SecurityJavaScript Security
JavaScript Security

This document summarizes security issues with JavaScript and discusses vulnerabilities like cross-site scripting (XSS) and cross-site request forgery (CSRF). It provides examples of how XSS can be used to steal cookies and hijack sessions. It also discusses challenges with securing JSON responses and preventing code injection attacks. Countermeasures discussed include escaping output, adding random tokens to forms, and using a secure comment syntax to wrap sensitive JSON responses.

Javascript Security
Javascript SecurityJavascript Security
Javascript Security

It's time to deprecate JavaScript. It's security model and the language itself are appalling. As data moves into the cloud the JavaScript threat is increasing and I believe the only way to fix this is to start all over again. The 14 year old language and security model aren't up to today's threats.

virus bulletinsecurityjavascript
© Digital Security 17
MITM Attacks on HTTPS: Another Perspective
Video. XSS
© Digital Security 18
MITM Attacks on HTTPS: Another Perspective
Tricks
A. can make injections into any http traffic:
• no need to force user to open a link w/ HostB XSS
© Digital Security 19
MITM Attacks on HTTPS: Another Perspective
Tricks
A. can make injections into any http traffic:
• A. can add HostB’s cookies for HostA
and exploit XSS of HostB w/ auth
(cookie forcing)
We can exploit Self-XSS! %P
© Digital Security 20
MITM Attacks on HTTPS: Another Perspective
Flash
• Crossdomain.xml allows cross domain interaction
HostB:
• API server
• No cookie
• Has crossdomain.xml file with * (or similar)
<cross-domain-policy><allow-access-from domain="*" secure=“true"/></cross-domain-policy>
No way to perform an attack?

Recommended for you

Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?

Above are my slides I used during a workshop I conducted at the Moroccan Cyber Security Camp back in May 2017.

infosecpentestpenetration testing
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf

This document discusses how to defeat cross-site scripting (XSS) and cross-site request forgery (XSRF) when using JavaServer Faces (JSF) frameworks. It covers validating user input, encoding output, and protecting view states to prevent XSS, as well as configuring JSF implementations to protect against XSRF by encrypting view states and adding tokens to URLs. The presentation emphasizes testing validation, encoding, and protection in specific JSF implementations since behaviors can differ.

Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )

Contents : - Introduction - Description as A Widely Used Hacking Technique - How it is used in Hacking - What can be done with XSS #XSS, #Hacking, #Security, #CookieStealing, #InternetBug, #HTMLInjection Sincerely, Irfad Imtiaz

xsshackingsoftware development
© Digital Security 21
MITM Attacks on HTTPS: Another Perspective
Flash
Crossdomain.xml w/ * on HostB
(nothing)
1. V . opens A’s swf
- Swf sends request to HostA
2. Flash checks crossdomain.xml
3. A. MitMs and changes an IP
4. HostB responses w/ crossdomain.xml
- Swf is allowed to interact w/ HostA
- A. stops the MitM attack
5. SWF can interact with HostA in a
usual way
© Digital Security 22
MITM Attacks on HTTPS: Another Perspective
Cross protocol - IE
Text-based service that reflects requests on HostB
• SMTP, POP3, IMAP, etc
• Browser - Internet Explorer
• Old school attack
• HTTP/0.9
• Content-Sniffing (.html)
• Port restriction – doesn’t work, It’s MitM
© Digital Security 23
MITM Attacks on HTTPS: Another Perspective
Cross protocol - IE
Text-based service that reflects requests
on HostB
• SMTP, POP3, IMAP, etc
• Browser - Internet Explorer
• Old school attack
• HTTP/0.9
• Content-Sniffing (.html)
• Port restriction – doesn’t work, It’s MitM
© Digital Security 24
MITM Attacks on HTTPS: Another Perspective
Cross protocol - IE
1. V. sends the POST request w/ JS payload to “any_url.html on” to
HostA
2. A. MitMs and changes an IP
3. HostB reflects the request
- IE interprets it as HTTP/0.9
- “.html” forces IE to parse as html
- V. executes JS (in the context of HostA)
- A. stops the MitM attack
4. JS can interact with HostA in a usual way

Recommended for you

Sandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorageSandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorage

This document discusses using iframes, postMessage, and localStorage for communication in a sandboxed web application platform. It notes both advantages and disadvantages of iframes, describes how to securely communicate between iframes and different browser tabs or windows using postMessage, and explores strategies and considerations for using localStorage for communication.

Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13

This document discusses sandboxing untrusted JavaScript from third parties to improve security. It proposes a two-tier sandbox architecture that uses JavaScript libraries and wrappers, without requiring browser modifications. Untrusted code is executed in an isolated environment defined by policy code, and can only access approved APIs. This approach aims to mediate access between code and the browser securely and efficiently while maintaining compatibility with existing third-party scripts.

Analysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in TurkeyAnalysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in Turkey

The document provides an analysis of HTTP security headers in Turkey. It begins with an outline that covers topics like web browsers and same-origin policy, the OWASP top 10 security risks, and various HTTP security headers like content security policy, X-XSS-Protection, and strict transport security. It then analyzes the implementation of security headers on the Alexa top 500 websites in Turkey and finds that adoption is still low. The document concludes with pointers to further resources for information on security headers.

securityhttp headersweb security
© Digital Security 25
MITM Attacks on HTTPS: Another Perspective
Video. Cross protocol - IE
© Digital Security 26
MITM Attacks on HTTPS: Another Perspective
Cross protocol – Other browsers (FF, Chrome)
A. wants to steal Basic Auth header or HttpOnly cookie
A. has XSS on HostA (can execute JS in it’s context) (Nothing)
1. JS sends a request to HostA
2. A. MitMs and changes IP
3. HostB reflects the request
-Browser interprets it as HTTP/0.9, text/plain
- JS is allowed to read response (same origin)
© Digital Security 27
MITM Attacks on HTTPS: Another Perspective
JavaScript +DOM
Web app w/ JQuery uses load() to get content
Text-based service that reflects requests on HostB (Nothing) or file uploading is possible
0. A. sets a cookie w/ xss on HostA (cookie forcing)
Set-Cookie: test=<script src=“…”>
1. V. opens HostA. Jquery is loaded.
- For other requests load() is used
2. load sends a request to HostA
3. A. MitMs and changes an IP
4. HostB reflects the request
-Browser interprets it as HTTP/0.9, text/plain
- Jquery.load parses it and execute our XSS payload
5. Our JS can interact with HostA in a usual way
© Digital Security 28
MITM Attacks on HTTPS: Another Perspective
REST API
V. is a web app that checks auth (for 200 OK) using HostA REST API
Text-based service that reflects requests on HostB (Nothing) or it returns 200 OK for any requests
1. A. tries to auth on V
2. V. sends request to HostA to check auth
3. A. MitMs and changes an IP
4. HostB reflects all the request
- Curl interprets it as HTTP/0.9 *
- Curl returns CURLE_OK
5. A. is authenticated
* https://github.com/curl/curl/issues/467

Recommended for you

526_topic08.ppt
526_topic08.ppt526_topic08.ppt
526_topic08.ppt

The document discusses various web security topics such as cookies, same origin policy, cross-site scripting (XSS), and cross-site request forgery (CSRF). Cookies are used to maintain state in stateless HTTP and can be used for authentication. The same origin policy restricts how scripts from different origins can access each other's resources. XSS occurs when untrusted user input containing scripts is rendered without sanitization. CSRF tricks authenticated users into performing actions on a web site by submitting forged HTTP requests, leveraging the user's session to bypass CSRF protections.

#addy
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security

HTML5 introduces significant changes for today\'s websites: new and updated tags, new functionality, better error handling and improved Document Object Model (DOM). However, the HTML5 new features come with new (application) security vulnerabilities. This presentation reviews the new attack vectors, associated risks and what a needs to be taken into consideration when implementing HTML5.

information securityhtml5application security
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling

HTTP request smuggling involves sending malformed HTTP requests to exploit vulnerabilities in how devices handle requests. This allows an attacker to smuggle a request to one device without the other being aware. Key techniques include using multiple content-length headers, GET requests with content-length, and CRLF tricks to treat multiple requests as one. Prevention focuses on firewalls, terminating sessions after each request, disabling caching, and enforcing strict HTTP parsing.

web security
© Digital Security 29
MITM Attacks on HTTPS: Another Perspective
Upload anything
A. can upload files on HostB
Too simple:
• Html w/ xss , SWF, PDF … (SDRF attack)
• Everything is executed in the context of HostA
The same attack as in the example with XSS
© Digital Security 30
MITM Attacks on HTTPS: Another Perspective
Active content substitution
A. can upload files on HostB, but w/ “uninteresting” Content-Type (text/plain, image/png)
or Content-Disposition (any path)
Think out of the box:
• Page consists of html, external files – JavaScript and CSS
• Force downloading JS from another host
• https://hosta/script.js
© Digital Security 31
MITM Attacks on HTTPS: Another Perspective
Active content substitution
• Page consists of html, external files – JavaScript and CSS
• Force downloading JS from another host
• One TLS for all content?
© Digital Security 32
MITM Attacks on HTTPS: Another Perspective
Browsers behavior
<script src=“script.js”> and headers:
- no browser cares about Content-Disposition header
- IE doesn't care about Content-Type header (without nosniff)
- FF, Chrome, Edge dont't execute script only if Content-Type is from
"image" family (without nosniff)
- with X-Content-Type-Options, all the browsers require correct
Content-Type

Recommended for you

Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling

HTTP request smuggling involves sending malformed HTTP requests to exploit vulnerabilities in how devices handle requests. This allows an attacker to smuggle a request to one device without the other being aware. Key techniques include using multiple content-length headers, GET requests with content-length, and CRLF tricks to treat multiple requests as one. Prevention focuses on firewalls, terminating sessions after each request, disabling caching, and enforcing strict HTTP parsing.

Browser Security
Browser SecurityBrowser Security
Browser Security

This talk is a generic but comprehensive overview of security mechanism, controls and potential attacks in modern browsers. The talk focuses also on new technologies, such as HTML5 and related APIs to highlight new attack scenario against browsers.

securityhackinghtml5
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)

Same-origin policy is an important security concept of the modern browser languages like JavaScript but becomes an obstacle for developers when building complex client-side apps. Over time there have been lots of ingenious workarounds using JSON-P, IFRAME and proxies. As of January 2013 the well known Cross Origin Resource Sharing (CORS) comes as proposed standard by W3C and has now native support by all major browsers.

web securitycorsxss
© Digital Security 33
MITM Attacks on HTTPS: Another Perspective
Active content substitution
Possible Attacks:
• External files is on another web site (https://static.correct.com/script.js)
– easy for MitM (static.correct.com -> HostB)
• Protocol attacks
© Digital Security 34
MITM Attacks on HTTPS: Another Perspective
Active content substitution
Possible Attacks:
• WPAD
• Automatic proxy detection. Windows, by
default
• Pac file w/ rules
• For Chrome, Firefox:
different proxies for different URLs
• Chrome – patched, FF – will be patched;
Windows – partly patched; after BH 2016 
• Now: Useful only for different sites (and tricks)
© Digital Security 35
MITM Attacks on HTTPS: Another Perspective
Active content substitution
Possible Attacks:
• Browser’s cache misuse
• By default, web servers add cache headers to “static” content (javascript, css, etc)
• Browser cache is URL-based
© Digital Security 36
MITM Attacks on HTTPS: Another Perspective
Active content substitution
A. can upload files on HostB, but w/ “uninteresting” Content-Type or Content-Disposition (any path)
1. V. request to HostA + script.js of HostB
2. A. MitMs and changes IP
3. HostB responses with A’s JS
- V. caches JS for url:
https://hosta/script.js
- A. stops mitm attack
4. A. forces V. to open HostA
- V. parses html from HostA
- But takes script.js from its cache, cause it’s there and still fresh
- V. executes JS (in the context of HostA)
- JS can interact with HostA in a usual way

Recommended for you

15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt

This document discusses various topics relating to web security, including: - The same origin policy which isolates scripts and resources from different origins to prevent access. - Cross-site scripting (XSS) which can occur when user inputs containing scripts are displayed on a webpage without sanitization, allowing attackers to execute scripts in a victim's browser. - How XSS was used in a worm on MySpace that infected many users by adding the attacker as a friend when their profile was visited. - The use of cookies by websites to maintain state in the stateless HTTP protocol and how session hijacking is a risk if cookies are stolen.

Presentation on Application layer_201.pdf
Presentation on Application layer_201.pdfPresentation on Application layer_201.pdf
Presentation on Application layer_201.pdf

A Network application is an application running on one host and provides a communication to another application running on a different host. ▪ A network application development is writing programs that run on different end systems and communicate with each other over the network. ▪ In the Web application there are two different programs that communicate with each other: ✔ Browser program running in the user's host. ✔ Web server program running in the Web server host. Host Host 2 Network Applications - Examples ▪ Email ▪ Web ▪ Remote Login ▪ P2P File Sharing ▪ Multi-user Network Games ▪ Streaming Stored Video (YouTube) ▪ Voice Over IP (Skype) ▪ Real-time Video Conference ▪ Social Networking 3 Network Application Architecture 1. Client-Server architecture 2. P2P (Peer to Peer) architecture 4 1. Client-Server Architecture Client Server: ✔ Its always-on host. ✔ It has a fixed IP address. ✔ Large cluster of host – Data Centers. ✔ E.g. Web Server Client: ✔ It communicate with server. ✔ Its not like continuously connected. ✔ May have dynamic IP addresses. ✔ Do not communicate directly with each other. ✔ E.g. PCs, Mobiles Server 5 2. P2P Architecture Peer ▪ Peers (end systems) directly communicate. ▪ Get peers request service from other peers, provide service to other peers. ✔ Self Scalability – New peers bring new service capacity, as well as new service demands. ▪ Peers are alternatingly connected and change IP addresses. ✔ Complex management 6 Peer Peer Process Communicating ▪ What is Process? ▪ A process is an instance of a program running in a computer. ▪ We can say that process is program under execution. ▪ Within same host, two processes communicate using inter-process communication (IPC). ▪ Process in different hosts communicate by exchanging messages. ▪ Client process: A process that initiates communication. ▪ Server process: A process that waits to be contacted. Process P1 Process P2 7 Socket ▪ A process sends messages into, and receives messages from; the network through a software interface called a socket. ▪ A process is similar to a house and its socket is similar to its door. ✔ Sending process passes message out door. ✔ Sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process. Process application proce ss transport network link physical application proce ss transport network link physical socket controlled by app developer controlled by OS Internet Socket 8 Transport Services to Applications ▪ Recall that a socket is the interface between the application process and the transport layer protocol. ▪ For develop an application, choose available transport layer protocol. ▪ Pick the protocol with the services that best match the needs of your application.

HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications

The widespread demand for online privacy, also fueled by widely-publicized demonstrations of session hijacking attacks against popular websites (see Firesheep), has spearheaded the increasing deployment of HTTPS. However, many websites still avoid ubiquitous encryption due to performance or compatibility issues. The prevailing approach in these cases is to force critical functionality and sensitive data access over encrypted connections, while allowing more innocuous functionality to be accessed over HTTP. In practice, this approach is prone to flaws that can expose sensitive information or functionality to third parties. In this work, we conduct an in-depth assessment of a diverse set of major websites and explore what functionality and information is exposed to attackers that have hijacked a user's HTTP cookies. We identify a recurring pattern across websites with partially deployed HTTPS; service personalization inadvertently results in the exposure of private information. The separation of functionality across multiple cookies with different scopes and inter-dependencies further complicates matters, as imprecise access control renders restricted account functionality accessible to non-session cookies. Our cookie hijacking study reveals a number of severe flaws; attackers can obtain the user's home and work address and visited websites from Google, Bing and Baidu expose the user's complete search history, and Yahoo allows attackers to extract the contact list and send emails from the user's account. Furthermore, e-commerce vendors such as Amazon and Ebay expose the user's purchase history (partial and full respectively), and almost every website exposes the user's name and email address. Ad networks like Doubleclick can also reveal pages the user has visited. To fully evaluate the practicality and extent of cookie hijacking, we explore multiple aspects of the online ecosystem, including mobile apps, browser security mechanisms, extensions and search bars. To estimate the extent of the threat, we run IRB-approved measurements on a subset of our university's public wireless network for 30 days, and detect over 282K accounts exposing the cookies required for our hijacking attacks. We also explore how users can protect themselves and find that, while mechanisms such as the EFF's HTTPS Everywhere extension can reduce the attack surface, HTTP cookies are still regularly exposed. The privacy implications of these attacks become even more alarming when considering how they can be used to deanonymize Tor users. Our measurements suggest that a significant portion of Tor users may currently be vulnerable to cookie hijacking. (Source: Black Hat USA 2016, Las Vegas)

© Digital Security 37
MITM Attacks on HTTPS: Another Perspective
Active content substitution
© Digital Security 38
MITM Attacks on HTTPS: Another Perspective
Active content substitution - Trick
A. can upload files on HostB, but w/ “uninteresting” Content-Type or Content-Disposition
(specific path)
How can we manipulate with a path?
Depends on technologies
• RPO
• Default error page w/ relative scripts
https://hosta/anything_here/lalala/ -> anything_here/lalala/script.js
• IE HostHeader injection
• …
© Digital Security 39
MITM Attacks on HTTPS: Another Perspective
What else?
• HTTPS 2 HTTP redirect
• Reverse Proxy misrouting (CDNs)
• Certificate Pinning
• Client Cert auth "bypass“
• CSP bypass
• Crypto attacks
• Another Protocols
• …
© Digital Security 40
MITM Attacks on HTTPS: Another Perspective
Conclusion
TLS Redirection
• Based on TLS features
• Based on your imagination and circumstances
• For any protocol (but works best for HTTPS)
• Not so hard to exploit
• You can get something from nothing (or misuse safe stuff)

Recommended for you

Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012

Top 10 Web Hacks Every year the number and creativity of Web hacks increases, and the damage from these attacks rises exponentially, costing organizations millions every year. Join this webinar to learn about the latest and most insidious Web-based attacks. The much anticipated list, now in its seventh year, represents exhaustive research conducted by a panel of experienced security industry professionals. Learn the latest of the worst in Web hacks, and how to protect your organization.

information securitytop 10web application
ASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitch

This document provides an overview and configuration instructions for F5 Networks' DDoS protection profile. It describes how the profile monitors traffic levels and latency to detect anomalies indicative of DDoS attacks. Upon detection, it can activate prevention policies like client-side integrity checks, CAPTCHAs, and request blocking to mitigate attacks. The profile analyzes traffic at the IP, geolocation, URL, and site-wide levels to determine the appropriate prevention response. It also details how the Proactive Bot Defense feature works to proactively challenge all clients.

wafapp ddos
14_526_topic11.ppt
14_526_topic11.ppt14_526_topic11.ppt
14_526_topic11.ppt

This document discusses various topics related to web security, including: - Cross-site scripting (XSS) which occurs when untrusted user inputs containing scripts are displayed on a webpage without sanitization, allowing attackers to execute scripts in a victim's browser. - Cross-site request forgery (CSRF) which takes advantage of browsers automatically sending cookies for a website to that website, allowing an attacker to forge requests from a logged in user's browser without their knowledge. - The same-origin policy which aims to isolate scripts and resources from different web origins to prevent unauthorized access, but has limitations that can be exploited by XSS attacks. - Methods for preventing XSS like sanitizing untrusted inputs

© Digital Security 41
MITM Attacks on HTTPS: Another Perspective
Conclusion
TLS Redirection
• “New” approach of attacking TLS
secured protocols
• The security level of web service equals
to the security level of the weakest
service with common certificate
• Based on the certificate of the weakest
service
© Digital Security 42
MITM Attacks on HTTPS: Another Perspective
Conclusion
• Awareness
• Need more research
• There will be a lot of stuff and tricks - https://github.com/GrrrDog/TLS-Redirection
Read about Virtual Host Confusion - https://bh.ht.vc/ - AWESOME STUFF THERE!
© Digital Security 43
MITM Attacks on HTTPS: Another Perspective
Questions
www.twitter.com/antyurin
a.tyurin@dsec.ru

More Related Content

What's hot

Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser Security
Sanjeev Verma, PhD
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
Jeremiah Grossman
 
Html5 localstorage attack vectors
Html5 localstorage attack vectorsHtml5 localstorage attack vectors
Html5 localstorage attack vectors
Shreeraj Shah
 
OWASP San Diego Training Presentation
OWASP San Diego Training PresentationOWASP San Diego Training Presentation
OWASP San Diego Training Presentation
owaspsd
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
Jeremiah Grossman
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Wayne Huang
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites
Mikhail Egorov
 
Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014 Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014
n|u - The Open Security Community
 
DEfcon15 XXE XXS
DEfcon15 XXE XXSDEfcon15 XXE XXS
DEfcon15 XXE XXS
pentest pentest
 
When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the masses
Michele Orru
 
Hunting for security bugs in AEM webapps
Hunting for security bugs in AEM webappsHunting for security bugs in AEM webapps
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed
Prathan Phongthiproek
 
Same Origin Policy Weaknesses
Same Origin Policy WeaknessesSame Origin Policy Weaknesses
Same Origin Policy Weaknesses
kuza55
 
JavaScript Security
JavaScript SecurityJavaScript Security
JavaScript Security
Jason Harwig
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Security
jgrahamc
 
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
Yassine Aboukir
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
drewz lin
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )
Irfad Imtiaz
 
Sandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorageSandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorage
tomasperezv
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
drewz lin
 

What's hot (20)

Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser Security
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Html5 localstorage attack vectors
Html5 localstorage attack vectorsHtml5 localstorage attack vectors
Html5 localstorage attack vectors
 
OWASP San Diego Training Presentation
OWASP San Diego Training PresentationOWASP San Diego Training Presentation
OWASP San Diego Training Presentation
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites
 
Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014 Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014
 
DEfcon15 XXE XXS
DEfcon15 XXE XXSDEfcon15 XXE XXS
DEfcon15 XXE XXS
 
When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the masses
 
Hunting for security bugs in AEM webapps
Hunting for security bugs in AEM webappsHunting for security bugs in AEM webapps
Hunting for security bugs in AEM webapps
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed
 
Same Origin Policy Weaknesses
Same Origin Policy WeaknessesSame Origin Policy Weaknesses
Same Origin Policy Weaknesses
 
JavaScript Security
JavaScript SecurityJavaScript Security
JavaScript Security
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Security
 
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )
 
Sandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorageSandboxed platform using IFrames, postMessage and localStorage
Sandboxed platform using IFrames, postMessage and localStorage
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
 

Similar to MITM Attacks on HTTPS: Another Perspective

Analysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in TurkeyAnalysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in Turkey
Dr. Emin İslam Tatlı
 
526_topic08.ppt
526_topic08.ppt526_topic08.ppt
526_topic08.ppt
sajeedmalagi
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
chuckbt
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
Apijay Kumar
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
Apijay Kumar
 
Browser Security
Browser SecurityBrowser Security
Browser Security
Roberto Suggi Liverani
 
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Ivo Andreev
 
15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt
shatrutrial44
 
Presentation on Application layer_201.pdf
Presentation on Application layer_201.pdfPresentation on Application layer_201.pdf
Presentation on Application layer_201.pdf
prince2412001
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
Priyanka Aash
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
Matt Johansen
 
ASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitch
Lior Rotkovitch
 
14_526_topic11.ppt
14_526_topic11.ppt14_526_topic11.ppt
14_526_topic11.ppt
ssuserec53e73
 
14_526_topic11.ppt
14_526_topic11.ppt14_526_topic11.ppt
14_526_topic11.ppt
ssuserec53e73
 
Securing your web application through HTTP headers
Securing your web application through HTTP headersSecuring your web application through HTTP headers
Securing your web application through HTTP headers
Andre N. Klingsheim
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eric Vanderburg
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
Wiliam Ferraciolli
 
BeEF_EUSecWest-2012_Michele-Orru
BeEF_EUSecWest-2012_Michele-OrruBeEF_EUSecWest-2012_Michele-Orru
BeEF_EUSecWest-2012_Michele-Orru
Michele Orru
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
Jeremiah Grossman
 
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security ConsiderationsApache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr
 

Similar to MITM Attacks on HTTPS: Another Perspective (20)

Analysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in TurkeyAnalysis of HTTP Security Headers in Turkey
Analysis of HTTP Security Headers in Turkey
 
526_topic08.ppt
526_topic08.ppt526_topic08.ppt
526_topic08.ppt
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
 
15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt15_526_topic11 for topics for students.ppt
15_526_topic11 for topics for students.ppt
 
Presentation on Application layer_201.pdf
Presentation on Application layer_201.pdfPresentation on Application layer_201.pdf
Presentation on Application layer_201.pdf
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
 
ASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitch
 
14_526_topic11.ppt
14_526_topic11.ppt14_526_topic11.ppt
14_526_topic11.ppt
 
14_526_topic11.ppt
14_526_topic11.ppt14_526_topic11.ppt
14_526_topic11.ppt
 
Securing your web application through HTTP headers
Securing your web application through HTTP headersSecuring your web application through HTTP headers
Securing your web application through HTTP headers
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
BeEF_EUSecWest-2012_Michele-Orru
BeEF_EUSecWest-2012_Michele-OrruBeEF_EUSecWest-2012_Michele-Orru
BeEF_EUSecWest-2012_Michele-Orru
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security ConsiderationsApache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
 

Recently uploaded

Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
byubyu7
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
ubufe
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Thiên Đường Tình Yêu
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
taqyea
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
exgf28
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
NandakumarP24
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
ubufe
 
Massey University degree offer diploma Transcript
Massey University degree offer diploma TranscriptMassey University degree offer diploma Transcript
Massey University degree offer diploma Transcript
ubufe
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
taqyea
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
taqyea
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
sivaraman163206
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
Serva AppLabs
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
taqyea
 
Common Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdfCommon Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdf
Serva AppLabs
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
taqyea
 

Recently uploaded (20)

Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
 
Massey University degree offer diploma Transcript
Massey University degree offer diploma TranscriptMassey University degree offer diploma Transcript
Massey University degree offer diploma Transcript
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
 
Common Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdfCommon Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdf
 
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
一比一原版(ukc毕业证书)英国肯特大学毕业证如何办理
 

MITM Attacks on HTTPS: Another Perspective

  • 1. © Digital Security MITM Attacks on HTTPS: Another Perspective Alexey GreenDog Tyurin @antyurin
  • 2. © Digital Security 2 MITM Attacks on HTTPS: Another Perspective About me • Pentester • Security researcher • WEB/Java/Network security fun • EasyHack for “Xakep” • Co-organizer ZeroNights • Co-organizer Defcon Russia 7812
  • 3. © Digital Security 3 MITM Attacks on HTTPS: Another Perspective HTTPS • TLS (SSL)+ HTTP • Protects against man-in-the-middle attacks • Authentication, Encryption, Integrity – Silver bullet ? • Crypto attacks: - POODLE, BEAST, CRIME… Hard to exploit
  • 4. © Digital Security 4 MITM Attacks on HTTPS: Another Perspective TLS specifics • Knows nothing including protocol: HTTP/SMTP/POP3/TDS/…+TLS TLS HTTP
  • 5. © Digital Security 5 MITM Attacks on HTTPS: Another Perspective TLS specifics • Application layer • Knows nothing about underlying protocol • Doesn’t protect against destination changing (IP, port) IP TCP TLS HTTP
  • 6. © Digital Security 6 MITM Attacks on HTTPS: Another Perspective TLS specifics • Authentication using x509 certificates • Client compares server name and SAN field of certificate
  • 7. © Digital Security 7 MITM Attacks on HTTPS: Another Perspective Certificates features and limitations • Doesn’t care about port (many services – 1 certificate) • For a wide range of domain names: • Many names in SAN - Subject Alternative Name (+ CN*) • Wildcard certificate • No SNI • TLS cache ** • HTTP/2 connection sharing** *Since 58, Chrome doesn’t check CN, only SAN (because of RFC) ** http://antoine.delignat-lavaud.fr/doc/www15.pdf
  • 8. © Digital Security 8 MITM Attacks on HTTPS: Another Perspective Wildcard names
  • 9. © Digital Security 9 MITM Attacks on HTTPS: Another Perspective A lot of names in SAN
  • 10. © Digital Security 10 MITM Attacks on HTTPS: Another Perspective TLS Redirection • Group of MitM attacks – misuse of authentication limits and features • Any protocol • Virtual host confusion (http://antoine.delignat-lavaud.fr/doc/www15.pdf)
  • 11. © Digital Security 11 MITM Attacks on HTTPS: Another Perspective Simplest example • Attacker (A) controls files on HostB • A. uploads own new_version.exe on HostB • Autoupdate on Victim (V) requests a new version of software: https://www.correct.com/new_version.exe • A. MitMs and redirect to HostB • Autoupdate downloads and runs A’s exe file
  • 12. © Digital Security 12 MITM Attacks on HTTPS: Another Perspective Requirements • HostA and HostB have different IP (or ports) • HostB has an x509 certificate with the domain name of HostA in SAN
  • 13. © Digital Security 13 MITM Attacks on HTTPS: Another Perspective Requirements • Depends on a situation: • When a request for HostA comes to HostB, there is no such a value in virtual hosts of HostB webserver, HostB serves default domain.
  • 14. © Digital Security 14 MITM Attacks on HTTPS: Another Perspective Requirements • A. controls something in user’s requests or server’s responses
  • 15. © Digital Security 15 MITM Attacks on HTTPS: Another Perspective Level of control What can A. control with the help of a server’s response (with focus on HTTPS): • Nothing • Parts of response (some values in body) • Full body of a specific URL. • Full body of any URL. • Full control (header, body) w/o access to TLS key.
  • 16. © Digital Security 16 MITM Attacks on HTTPS: Another Perspective Common example – XSS XSS on HostB (Part of body) 1. V. request to HostA + xss of HostB https://www.correct.com/xss_of_hostb_here 2. A. MitMs and changes an IP 3. HostB responses with A’s JS - V. executes JS (context of HostA) - A. stops the MitM attack 4. JS can interact with HostA in a usual way Browser knows nothing about MitM!
  • 17. © Digital Security 17 MITM Attacks on HTTPS: Another Perspective Video. XSS
  • 18. © Digital Security 18 MITM Attacks on HTTPS: Another Perspective Tricks A. can make injections into any http traffic: • no need to force user to open a link w/ HostB XSS
  • 19. © Digital Security 19 MITM Attacks on HTTPS: Another Perspective Tricks A. can make injections into any http traffic: • A. can add HostB’s cookies for HostA and exploit XSS of HostB w/ auth (cookie forcing) We can exploit Self-XSS! %P
  • 20. © Digital Security 20 MITM Attacks on HTTPS: Another Perspective Flash • Crossdomain.xml allows cross domain interaction HostB: • API server • No cookie • Has crossdomain.xml file with * (or similar) <cross-domain-policy><allow-access-from domain="*" secure=“true"/></cross-domain-policy> No way to perform an attack?
  • 21. © Digital Security 21 MITM Attacks on HTTPS: Another Perspective Flash Crossdomain.xml w/ * on HostB (nothing) 1. V . opens A’s swf - Swf sends request to HostA 2. Flash checks crossdomain.xml 3. A. MitMs and changes an IP 4. HostB responses w/ crossdomain.xml - Swf is allowed to interact w/ HostA - A. stops the MitM attack 5. SWF can interact with HostA in a usual way
  • 22. © Digital Security 22 MITM Attacks on HTTPS: Another Perspective Cross protocol - IE Text-based service that reflects requests on HostB • SMTP, POP3, IMAP, etc • Browser - Internet Explorer • Old school attack • HTTP/0.9 • Content-Sniffing (.html) • Port restriction – doesn’t work, It’s MitM
  • 23. © Digital Security 23 MITM Attacks on HTTPS: Another Perspective Cross protocol - IE Text-based service that reflects requests on HostB • SMTP, POP3, IMAP, etc • Browser - Internet Explorer • Old school attack • HTTP/0.9 • Content-Sniffing (.html) • Port restriction – doesn’t work, It’s MitM
  • 24. © Digital Security 24 MITM Attacks on HTTPS: Another Perspective Cross protocol - IE 1. V. sends the POST request w/ JS payload to “any_url.html on” to HostA 2. A. MitMs and changes an IP 3. HostB reflects the request - IE interprets it as HTTP/0.9 - “.html” forces IE to parse as html - V. executes JS (in the context of HostA) - A. stops the MitM attack 4. JS can interact with HostA in a usual way
  • 25. © Digital Security 25 MITM Attacks on HTTPS: Another Perspective Video. Cross protocol - IE
  • 26. © Digital Security 26 MITM Attacks on HTTPS: Another Perspective Cross protocol – Other browsers (FF, Chrome) A. wants to steal Basic Auth header or HttpOnly cookie A. has XSS on HostA (can execute JS in it’s context) (Nothing) 1. JS sends a request to HostA 2. A. MitMs and changes IP 3. HostB reflects the request -Browser interprets it as HTTP/0.9, text/plain - JS is allowed to read response (same origin)
  • 27. © Digital Security 27 MITM Attacks on HTTPS: Another Perspective JavaScript +DOM Web app w/ JQuery uses load() to get content Text-based service that reflects requests on HostB (Nothing) or file uploading is possible 0. A. sets a cookie w/ xss on HostA (cookie forcing) Set-Cookie: test=<script src=“…”> 1. V. opens HostA. Jquery is loaded. - For other requests load() is used 2. load sends a request to HostA 3. A. MitMs and changes an IP 4. HostB reflects the request -Browser interprets it as HTTP/0.9, text/plain - Jquery.load parses it and execute our XSS payload 5. Our JS can interact with HostA in a usual way
  • 28. © Digital Security 28 MITM Attacks on HTTPS: Another Perspective REST API V. is a web app that checks auth (for 200 OK) using HostA REST API Text-based service that reflects requests on HostB (Nothing) or it returns 200 OK for any requests 1. A. tries to auth on V 2. V. sends request to HostA to check auth 3. A. MitMs and changes an IP 4. HostB reflects all the request - Curl interprets it as HTTP/0.9 * - Curl returns CURLE_OK 5. A. is authenticated * https://github.com/curl/curl/issues/467
  • 29. © Digital Security 29 MITM Attacks on HTTPS: Another Perspective Upload anything A. can upload files on HostB Too simple: • Html w/ xss , SWF, PDF … (SDRF attack) • Everything is executed in the context of HostA The same attack as in the example with XSS
  • 30. © Digital Security 30 MITM Attacks on HTTPS: Another Perspective Active content substitution A. can upload files on HostB, but w/ “uninteresting” Content-Type (text/plain, image/png) or Content-Disposition (any path) Think out of the box: • Page consists of html, external files – JavaScript and CSS • Force downloading JS from another host • https://hosta/script.js
  • 31. © Digital Security 31 MITM Attacks on HTTPS: Another Perspective Active content substitution • Page consists of html, external files – JavaScript and CSS • Force downloading JS from another host • One TLS for all content?
  • 32. © Digital Security 32 MITM Attacks on HTTPS: Another Perspective Browsers behavior <script src=“script.js”> and headers: - no browser cares about Content-Disposition header - IE doesn't care about Content-Type header (without nosniff) - FF, Chrome, Edge dont't execute script only if Content-Type is from "image" family (without nosniff) - with X-Content-Type-Options, all the browsers require correct Content-Type
  • 33. © Digital Security 33 MITM Attacks on HTTPS: Another Perspective Active content substitution Possible Attacks: • External files is on another web site (https://static.correct.com/script.js) – easy for MitM (static.correct.com -> HostB) • Protocol attacks
  • 34. © Digital Security 34 MITM Attacks on HTTPS: Another Perspective Active content substitution Possible Attacks: • WPAD • Automatic proxy detection. Windows, by default • Pac file w/ rules • For Chrome, Firefox: different proxies for different URLs • Chrome – patched, FF – will be patched; Windows – partly patched; after BH 2016  • Now: Useful only for different sites (and tricks)
  • 35. © Digital Security 35 MITM Attacks on HTTPS: Another Perspective Active content substitution Possible Attacks: • Browser’s cache misuse • By default, web servers add cache headers to “static” content (javascript, css, etc) • Browser cache is URL-based
  • 36. © Digital Security 36 MITM Attacks on HTTPS: Another Perspective Active content substitution A. can upload files on HostB, but w/ “uninteresting” Content-Type or Content-Disposition (any path) 1. V. request to HostA + script.js of HostB 2. A. MitMs and changes IP 3. HostB responses with A’s JS - V. caches JS for url: https://hosta/script.js - A. stops mitm attack 4. A. forces V. to open HostA - V. parses html from HostA - But takes script.js from its cache, cause it’s there and still fresh - V. executes JS (in the context of HostA) - JS can interact with HostA in a usual way
  • 37. © Digital Security 37 MITM Attacks on HTTPS: Another Perspective Active content substitution
  • 38. © Digital Security 38 MITM Attacks on HTTPS: Another Perspective Active content substitution - Trick A. can upload files on HostB, but w/ “uninteresting” Content-Type or Content-Disposition (specific path) How can we manipulate with a path? Depends on technologies • RPO • Default error page w/ relative scripts https://hosta/anything_here/lalala/ -> anything_here/lalala/script.js • IE HostHeader injection • …
  • 39. © Digital Security 39 MITM Attacks on HTTPS: Another Perspective What else? • HTTPS 2 HTTP redirect • Reverse Proxy misrouting (CDNs) • Certificate Pinning • Client Cert auth "bypass“ • CSP bypass • Crypto attacks • Another Protocols • …
  • 40. © Digital Security 40 MITM Attacks on HTTPS: Another Perspective Conclusion TLS Redirection • Based on TLS features • Based on your imagination and circumstances • For any protocol (but works best for HTTPS) • Not so hard to exploit • You can get something from nothing (or misuse safe stuff)
  • 41. © Digital Security 41 MITM Attacks on HTTPS: Another Perspective Conclusion TLS Redirection • “New” approach of attacking TLS secured protocols • The security level of web service equals to the security level of the weakest service with common certificate • Based on the certificate of the weakest service
  • 42. © Digital Security 42 MITM Attacks on HTTPS: Another Perspective Conclusion • Awareness • Need more research • There will be a lot of stuff and tricks - https://github.com/GrrrDog/TLS-Redirection Read about Virtual Host Confusion - https://bh.ht.vc/ - AWESOME STUFF THERE!
  • 43. © Digital Security 43 MITM Attacks on HTTPS: Another Perspective Questions www.twitter.com/antyurin a.tyurin@dsec.ru