SSL Spoofing Man-In-The-Middle attack on SSL Duane Peifer.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 16
Advertisements

SSLstrip Stepan Shykerynets
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Cryptography and Network Security
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
More Trick For Defeating SSL
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
M2M Gateway Features Jari Lahti, CTO
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Cs490ns-cotter1 SSH / SSL Supplementary material.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Course 201 – Administration, Content Inspection and SSL VPN
Smart Card Single Sign On with Access Gateway Enterprise Edition
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING AND.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Network Security Essentials Chapter 5
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
SSL with New Client Authentication Takuya Yahagi, S University of Aizu Performance Evaluation Lab.
Linux Networking and Security
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
1 SSH / SSL Supplementary material. 2 Secure Shell (SSH) One of the primary goals of the ARPANET was remote access Several different connections allowed.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptography CSS 329 Lecture 13:SSL.
Source Target Host PowerConvert Server PowerConvert Client HTTP: Port 80 TCP (or HTTPS: Port 443 TCP) In addition to HTTP/HTTPS, the following ports are.
SharkFest ‘16 Computer History Museum June 13-16, 2016 SharkFest ‘16 Markers – Beacons in an Ocean of Packets Matthew York 15th June 2016 Performance &
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
ECE 544: Middlebox lab Abhigyan Sharma.
CSCE 715: Network Systems Security
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CS 142 Lecture Notes: Network Security
Using SSL – Secure Socket Layer
VPN-Implementation Using UBUNTU OS and OpenVPN and Hamachi in client-server environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi.
CS 142 Lecture Notes: Network Security
SSL Protocol Figures used in the presentation
CS 142 Lecture Notes: Network Security
Presentation transcript:

SSL Spoofing Man-In-The-Middle attack on SSL Duane Peifer

Summary  How SSL works  Common SSL misconceptions  SSL Spoofing  Using sslstrip  Preventing SSL Spoofing  Examples of stripped sites

How SSL works Web Server Client PC Client hello Server hello Certificate Server hello done Client key exchange Change cipher spec Finished Change cipher spec Finished Secure connection

How SSL works TCP SSL HTTP TCP HTTP HTTPS

Common SSL misconceptions  HTTPS means I am secure right?  What about… −SSL version 2.0 flaws −Weak Ciphers < 128 bit −Certificate keys < 1024 bits −Client vulnerabilities −Server vulnerabilities −Application vulnerabilities  SSL can provide a false sense of security

SSL Spoofing  Moxie Marlinspike created sslstrip and presented at Black Hat DC  Does not attack SSL itself, but the transition from non-encrypted to encrypted communications.

Common HTTP/HTTPS Connection HTTP Connection on Port 80 Web Server Redirect to HTTPS Client PC HTTPS Connection on Port 443 Server Certificate Connection Established

Hijacking Communication Web Server Client PC HTTP request Modified HTTP Response Non-encrypted communication Attacker HTTP request Encrypted Communication Redirect to HTTPS URL

Using sslstrip 1.Get sslstrip A.Download and install sslstrip and arpspoof (linux only)   B.Backtrack 4 (pre-installed) 

Using sslstrip 2.Configure attack machine for IP forwarding. echo “1” > /proc/sys/net/ipv4/ip_forward 3.Route all HTTP traffic to sslstrip. iptables –t nat –A PREROUTING –p tcp --destination-port 80 –j REDIRECT --to-port Run sslstrip. sslstrip –l 54321

Using sslstrip 5.Configure ARP spoofing. arpspoof –i eth0 –t 6.Launch a sniffer and collect data.

Expanding the attack  What if a root certificate could be installed on the target?  The attacker could potentially replace the certificate and maintain a secure connection.

Preventing SSL Spoofing  Ensure you are using secure connections. Look for the HTTPS.  Be careful about where you use secure sites.  Secure machines on the network.  Use static ARP tables.* * This is a TON of work. Understand the ramifications of doing this before starting.

Secure

Stripped

Secure

Stripped

Secure

Stripped

Secure

Stripped

Secure

Stripped

Secure

Stripped

Secure

Stripped

Secure

Stripped

Summit FCU var bPasswordFocus = false;