lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040213161046.8384.qmail@www.securityfocus.com>
Date: 13 Feb 2004 16:10:46 -0000
From: <carlo@...dartmouth.edu>
To: bugtraq@...urityfocus.com
Subject: Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from
    Internet Explorer


In-Reply-To: <DHELIJMHOLKLHKFHGGGLIEDHCAAA.disclosure@...ecurity.ca>

It's nice to see this getting some attention.  We've been working on some exploits in this area for the last year, and actually have been able to use and/or steal a user's private key from the CSP that IE uses.

We used DLL injection for our attacks; we didn't know about dll proxies.

We put out a Technical Report about this in February of last year, and our paper appeared at the "2nd Annual PKI Research Workshop" at NIST in April 2003.  The latest version can be found here:

http://www.cs.dartmouth.edu/~carlo/research/tr2004-489.pdf

It's a fun read.

John


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ