Top Banner
 365-Day: https Cookie Stealing Mike Perry Defcon 2007
12

Defcon 16 Perry

Apr 04, 2018

Download

Documents

Nikhin Valsan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 1/12

 

365-Day: https Cookie Stealing

Mike PerryDefcon 2007

Page 2: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 2/12

 

Who am I?

● Volunteer Tor developer

 – Work on Torbutton, TorFlow

Privacy advocate, censorship opponent● Forward+Reverse engineer at Riverbed

● Flexitarian

● Random Hacker – Wrote a page-based malloc debugger

 – Wrote an IRC bot that got quoted as a human in amajor magazine

Page 3: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 3/12

 

Why am I doing this?

Exploit is not new or complicated... However:

● Vector is not narrow or wifi-only

 –

Sophisticated attackers can drain bank accounts withcustom cable/DSL modems

 – It also harms safe Tor usage, and that pisses me off

● Many sites are vulnerable, and don't seem to care.

● Response: Release a tool, lower the bar evenmore.

 – Encourage (correct and secure) SSL adoption

Page 4: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 4/12

 

Cookie Basics

● Variables set by websites in your browser

 – Used for authentication, tracking, storage

● Several properties that govern when transmitted

 – Domain

 – Path

 – Expiration

 – SSL bit (seldom used, this is where the fun begins)

Page 5: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 5/12

 

The 'SideJacking' Attack

● Glorified sniffer

 – Sniffs cookies transmitted via plaintext http

● Janky proxy based approach to do control+saving

● Completely passive: User must visit target site

● Able to save domain and path info

 – Path info may be too specific

 – Can lead to issues

● Admirable PR machine for such a simple hack

 – Waay exceeds my PR abilities. Little help? :)

Page 6: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 6/12

 

Active HTTP Cookie Hijacking

● Like CSRF, but we want the data transmitted, notany particular result

 – In fact, the server can reject the request

Scenario: – Yesterday: User logs in to mail.yahoo.com. Checks

"Remember me."

 – Today: User visits www.cnn.com via open wifi

 – Today: We inject <img src="http://mail.yahoo.com">

 – Today: Browser transmits yahoo cookies for image

 – Today: We sniff cookies, write them to cookies.txt

 – Tomorrow: Use cookies.txt to read their mail

Page 7: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 7/12

 

Active HTTPS Cookie Hijacking

● New Scenario:

 – Yesterday: User logs in to httpS://mail.google.com

 – Today: User visits www.cnn.com via open wifi

 – Today: We inject <imgsrc=”http://mail.google.com/mail">

 – Today: Browser transmits unprotected gmail GXcookie for http image fetch

 – Today: We sniff cookies, write them to cookies.txt

 – Tomorrow: Use cookies.txt to read their mail

● User never even checks gmail on hostile network!

Page 8: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 8/12

 

Vectors

● Not just open wifi

● ARP poisoning

DHCP spoofing● DSL+Cable modem networks?

 – Possible to sniff+inject on cable networks?

Some use DOCSIS auth+encryption now, but many modesare weak

 – May require two modems

● One custom with TX/RX frequencies switched

Page 9: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 9/12

 

'Manual' Attack

● Aka: How people were owned for the past 365days.

● Fire up wireshark

● Fire up airpwn/netsed with custom rule

● Copy cookies out of wireshark.

● Lame.

Page 10: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 10/12

 

Introducing CookieChaos

Fully automated pylorcon tool for cookie gathering

● Caches DNS responses

● Listens for 443 connections

 – Uses cache to map IP to domain name

● Stores IP+host into injection queue

● Next time IP connects to ANY website:

 – Inject <img src=”http://dnsname”>

● Gathers any resulting cookies and writescookies.txt file for use in Firefox

Page 11: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 11/12

 

Ok, so there is some configuration..

● Need cookie path for injection for some sites

 – No worries. List of paths for popular sites provided!

● Might want to steal other non-ssl sites too

 – No worries. Additional target list can be provided!

Page 12: Defcon 16 Perry

7/30/2019 Defcon 16 Perry

http://slidepdf.com/reader/full/defcon-16-perry 12/12

 

Demo

Demo