{"id":1105,"date":"2009-02-20T19:03:39","date_gmt":"2009-02-21T05:03:39","guid":{"rendered":"http:\/\/alsplace.info\/security\/1105\/researcher-demonstrates-ssl-attack\/"},"modified":"2009-08-20T15:11:23","modified_gmt":"2009-08-20T20:11:23","slug":"researcher-demonstrates-ssl-attack","status":"publish","type":"post","link":"http:\/\/alsplace.info\/?p=1105","title":{"rendered":"Researcher demonstrates SSL attack"},"content":{"rendered":"\n<!-- ALL ADSENSE ADS DISABLED -->\n<h1 style=\"margin-bottom: 0px\"><strong>A security researcher has demonstrated a way to hijack Secure Sockets Layer (SSL) sessions to intercept login data.<\/strong><\/h1>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">Moxie Marlinspike, who spoke at the Black Hat security conference on Wednesday, explained how to subvert an SSL session by performing a man-in-the-middle attack. The anarchist researcher explained in a YouTube video that the attack uses a tool developed called SSLstrip, which exploits the interface between http and https sessions.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&quot;SSLstrip man-in-the-middles all of the potential SSL connections on the network, specifically attacking the bridge between http and https,&quot; <a href=\"http:\/\/www.youtube.com\/watch?v=Rvp0oPluuLE\">Marlinspike said in the video<\/a>.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">Secure Sockets Layer, and its successor Transport Layer Security, are cryptographic protocols used to encrypt communications over TCP\/IP networks. SSL and TLS are often used by banks and other organizations to secure web transactions.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">The attack relies on users not directly calling <a href=\"http:\/\/www.coastalrock.com\/\">medicament cialis<\/a>  up an SSL session by typing a URL into a browser. Most users initiate sessions by clicking on a button. These buttons are located on unencrypted http pages, and clicking on them will take users to encrypted https pages to log in.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&quot;That opens up all kinds of avenues for ways that you might intercept [details],&quot; Marlinspike said. <a href=\"https:\/\/www.blackhat.com\/presentations\/bh-dc-09\/Marlinspike\/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf\">In his Black Hat presentation<\/a>, he claimed to have gathered details on 117 email accounts, seven PayPal logins and 16 credit card numbers, within a 24 hour period.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">SSLstrip works by watching http traffic, then by acting as a proxy when a user attempts to initiate an https session. While the user believes the secure session has been initiated, and SSLstrip has connected to the secure server via https, all traffic between the user and SSLstrip is http. This means &quot;disastrous warnings&quot; displayed by browsers are avoided, as to the browser the session appears normal. Login details can then be harvested.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">Marlinspike said that an https padlock logo can be spoofed in the URL bar, to further lull the user into a false sense of security.<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">&nbsp;<\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px\">While SSL is generally accepted as being secure, security researchers have claimed SSL communications can be intercepted. In August last year, researcher Mike Perry said he had been in discussions with Google regarding an exploit he planned to release, which would allow a hacker to intercept a user&#39;s communications with supposedly secure websites over an unsecured Wi-Fi network.<\/p>\n<p> <\/p>\n<div align=\"center\"><p id=\"player1\" style=\"display:none\"><a href=\"http:\/\/www.macromedia.com\/go\/getflashplayer\">Get the latest Flash Player<\/a> to see this player.<\/p>\r\n<noscript><p>[Javascript required to view Flash movie, please turn it on and refresh this page]<\/p><\/noscript>\r\n\r\n<script type=\"text\/javascript\">\r\n\tdocument.getElementById(\"player1\").style.display = \"\";\r\n\t\r\n\tvar s1 = new SWFObject(\"http:\/\/alsplace.info\/wp-content\/plugins\/flv-embed\/flvplayer.swf\",\"player1\",\"512\",\"404\",\"7\");\r\n\ts1.addParam(\"wmode\",\"transparent\");\r\n\ts1.addParam(\"allowscriptaccess\",\"always\");\r\n\ts1.addParam(\"allowfullscreen\",\"true\");\r\n\ts1.addVariable(\"height\",\"404\");\r\n\ts1.addVariable(\"width\",\"512\"); \n\ts1.addVariable(\"file\",\"\/wp-content\/video\/BlackHatDC09MoxieMarlinspikeInterview.flv\");\n\ts1.addVariable(\"image\",\"\/wp-content\/video\/BlackHatDC09MoxieMarlinspikeInterview.jpg\");\n\ts1.addVariable(\"link\",\"\/wp-content\/video\/BlackHatDC09MoxieMarlinspikeInterview.flv\");\n\ts1.addVariable(\"showstop\",\"true\");\r\n\ts1.write(\"player1\");\r\n<\/script><\/div>\n<p><\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d1105').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d1105\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d1105').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d1105').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"excerpt":{"rendered":"<p>A security researcher has demonstrated a way to hijack Secure Sockets Layer (SSL) sessions to intercept login data. &nbsp; Moxie Marlinspike, who spoke at the Black Hat security conference on Wednesday, explained how to subvert an SSL session by performing a man-in-the-middle attack. The anarchist researcher explained in a YouTube video that the attack uses [&hellip;]<\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d1105').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d1105\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d1105').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d1105').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[33,26],"tags":[],"_links":{"self":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/1105"}],"collection":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1105"}],"version-history":[{"count":0,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/1105\/revisions"}],"wp:attachment":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1105"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}