SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran
What is Man-in-the-Middle? It is an attack in which a Hacker places himself in between his potential victim and the host that victim communicates with He is able to see / manipulate all traffic sent between the two Because of the nature of the attack it has to happen at Layer 2
Tools of the Trade Atheros chipset based wireless card (preferred) Madwifi-NG drivers for setting card into AP mode Dnsspoof Utility to send spoofed DNS replies Delegated proxy server for performing SSL MITM
Attack Premise Victim Hacker Internet default I am the default AP DnsSpoof Delegated Hacker is connected to the Internet Hacker sets up a wireless Honeypot HONEYPOTHONEYPOT
Attack Steps Victim Hacker Internet default DnsSpoof Delegated HONEYPOTHONEYPOT DNS Request for mail.yahoo.com DNS Reply mail.yahoo.com at Sends False Certificate Accepts Certificate Sends Authentication Data Forwards Data to the real Yahoo Server Forwards Reply from Yahoo back to Client
Delegated – A closer look Delegated Yahoo Victim SPOOFED CERTSPOOFED CERT YAHOOCERTYAHOOCERT Delegated Uses a self generated certificate to communicate with Client Delegated Uses Yahoos certificate to communicate with Yahoo servers
Demo We will recreate this entire setup and see the demo in the next video The video will feature the hack from a Victims perspective Basics of making the setup have been discussed in this video already Left as an exercise for the user to recreate the setup