[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAM2Hf5nOtW4GfDcdeksPyYGhd8icjVsi+iLL5c=Oy+f6fnE2Eg@mail.gmail.com>
Date: Fri, 13 Jul 2012 11:24:37 -0700
From: Gage Bystrom <themadichib0d@...il.com>
To: Douglas Huff <mith@...obdobbs.org>,
"full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Predefined Post Authentication Session ID
Vulnerability
Well if I understand Tim correctly you wouldn't need a CA. In the attack he
mentioned not once do you ever actually look at the ssl content. He's
talking about redirecting them to plain http and then setting the session
cookie and redirecting them back. Then when the victim logs on over ssl,
the session cookie isn't changed and is treated as authenticated. Obviously
since you set the cookie, you know what it is and can then impersonate
them.
I also agree that it probably wouldn't take too much effort to make that
work, anything that can modify traffic ought to do the job easily enough
with some tweaking. If not it wouldn't take much effort to whip up
something specialized.
On Jul 13, 2012 11:15 AM, "Douglas Huff" <mith@...obdobbs.org> wrote:
>
> On Jul 13, 2012, at 11:07, Tim <tim-security@...tinelchicken.org> wrote:
>
> > This is complicated, but it's not that much more complicated than what
> > existing MitM tools, such as sslstrip, already do.
>
> Better. I'm fairly certain this entire attack could be
> automated/orchestrated with mitmproxy with close to zero code changes.
>
> Only "hard" part is the procurement of a ca that will work on the target
> or finding some "behind the firewall" app to target that already uses a
> self-signed/invalid cert the users are used to clicking through.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists