Download presentation
Presentation is loading. Please wait.
Published bySandra Wakeham Modified over 10 years ago
1
SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran http://www.SecurityTube.Net
2
What is Man-in-the-Middle? It is an attack in which a Hacker places himself in between his potential victim and the host that victim communicates with He is able to see / manipulate all traffic sent between the two Because of the nature of the attack it has to happen at Layer 2
3
Tools of the Trade Atheros chipset based wireless card (preferred) Madwifi-NG drivers for setting card into AP mode Dnsspoof Utility to send spoofed DNS replies Delegated proxy server for performing SSL MITM
4
Attack Premise Victim Hacker Internet default I am the default AP DnsSpoof Delegated Hacker is connected to the Internet Hacker sets up a wireless Honeypot HONEYPOTHONEYPOT
5
Attack Steps Victim Hacker Internet default DnsSpoof Delegated HONEYPOTHONEYPOT DNS Request for mail.yahoo.com 192.168.1.1 192.168.1.2 DNS Reply mail.yahoo.com at 192.168.1.1 https://mail.yahoo.com Sends False Certificate Accepts Certificate Sends Authentication Data Forwards Data to the real Yahoo Server Forwards Reply from Yahoo back to Client
6
Delegated – A closer look Delegated Yahoo Victim SPOOFED CERTSPOOFED CERT YAHOOCERTYAHOOCERT Delegated Uses a self generated certificate to communicate with Client Delegated Uses Yahoos certificate to communicate with Yahoo email servers
7
Demo We will recreate this entire setup and see the demo in the next video The video will feature the hack from a Victims perspective Basics of making the setup have been discussed in this video already Left as an exercise for the user to recreate the setup
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.