Man-in-the-Middle Attack on MySpace with Cain 45
Slimjim100 writes "Last year at ChicagoCon 2007, Brian Wilson gave a great talk entitled "Cain & Abel: Windows Can Hack, Too!" Although the presentation and audio recording of the talk can be downloaded from the ChicagoCon site at Library, I had totally forgotten to publish his videos. Just in case things didn't go as planned during the live event or his laptop crapped out on him, Brian made a video of the MITM attack he demonstrated using Cain. You get to see how Myspace and other social networking sites are not designed with security in mind."
Brian Wilson (Score:3, Funny)
Re: (Score:1)
Security? (Score:5, Insightful)
Duh.... (Score:1)
And if they used https? (Score:5, Insightful)
Yes, but... (Score:1)
Re: (Score:3, Informative)
Re: (Score:1, Insightful)
Re: (Score:2)
Last week: http://www.theregister.co.uk/2008/03/10/hsbc_cert_glitch/ [theregister.co.uk]
Fortunately, it was not a problem, as people would recognize the site as legitimate anyway. (Well, that's what the bank said.)
"Answer, never."
Never say never.
Re: (Score:2)
And you know what, they HEED my advice. They now have a priceless tool to protect themselves online where no one had ever mentioned it to them before.
IMO, we can't blame users where they've been kept ignorant, and in the case of https most techies write users off as click-through morons instead of taking 5 min
Re: (Score:2)
Also, https means it is actually possible to be secure -- you check that https is in the URL, and you refuse to connect if the certificate isn't valid.
Some sites default to http, but allow https. But no https means that option isn't even there -- you are going to be vulnerable, period. That's one of the many reasons I don'
This is not new (Score:5, Insightful)
What did the notice to Myspace/google etc consist of? I can break things on my local LAN, so fix your site?
If he did this in my office he'd get a tireiron to the head because I could walk over to him and do it.
Re: (Score:2, Interesting)
What did the notice to Myspace/google etc consist of? I can break things on my local LAN, so fix your site?
Well, yes.
The point is that, as you observe, it's trivial on many switched LANs to ARP poison and steal session credentials. (It's all about the session, dummy, not the data.) Pinch a Gmail password from a co-worker and you probably own their domain password, brokerage, online banking,... passwords as well.
You're right that this is nothing new, but the fix is really trivial. Use SSL or TLS. Gmail does support this; browse to https://mail.google.com/ [google.com], bookmark that and you're done. It's not like the co
Re: (Score:2)
Re: (Score:2)
When "my local LAN" is some random wifi hotspot, it would be nice to have it not be broken there.
And "fix your site" is as simple as sticking https in front of it. Google has this as an option, anyway.
Do I understand this correctly? (Score:5, Insightful)
How is this a big deal? This does not allow someone to get anyone's password that isn't on their same network. There are easier ways to get someone's password if you're on the same network as them, starting with slapping them until they give you their password. But it all comes back to - if the site matters, it's using HTTPs.
Re: (Score:2)
However, he shouldn't be contacting MySpace with "fix your website's security" - he should be contacting the router vendor(s) whose gear is so easily poisoned.
Re: (Score:1)
It's a bigger threat in places like schools, where students (sometimes) have access to the staff wired networks.
And of course, if you use wireless that's unencrypted or barely encrypted (ie, with WEP), you're susceptible to this too. Even if you plug your computer in, if there is a wireless access point on the same subnet, you can be ARP poisoned.
Cain and Abel aren't new. (Score:4, Informative)
Re: (Score:3, Informative)
Cain has actually progressed by ridiculous leaps and bounds since then. It can now parse and decode pretty much any password from any protocol off the network or out of a file. It can also do things like recording voip phone calls, and ssh2 sessions etc. It also has a pretty decent set of wireless cracking
Don't use MySpace! (Score:5, Insightful)
But even if they were to use HTTPS, that still wouldn't solve MySpace's issues. A lot of the people on my Friends List were not very tech savvy (like a lot of users), and, since most of them were teens, they easily fell for phishing scams and hacks. And then I get punished for their poor security practices by having my message board filled with ads for the "free, HoTtEsT ringtones!!!!" and "see girls naked!!!!" (btw all of those sites had viruses or malware on them). I stopped using MySpace after 2 months, I got tired of all the insecurity.
If I were to run this attack on the computers at my high school, I could cripple a lot of kid's social lives (and get expelled when the admins see
Kids these days are just not educated enough on good security practices, or show a lack of common sense with this stuff...
Re: (Score:2)
Ettercap has been there for ages now (Score:1)
Re: (Score:1)
Totally hyped news (Score:1)
Surprised?? (Score:3, Insightful)
Re: (Score:2)
Let's say I discovered you had logged on to Facebook with the username of "fluch" and a password of "blather". The next thing I'm going to try is to log on to gmail and try signing on as "fluch@gmail.com" with a password of "blather". After that, I'm going to try the same attack on paypal.com, amazon.com, bankofamerica.com and a thousand other places that you might be foolish enough to use the same ID and password and have the authority to spend money.
For ove
If your not on someone's LAN (Score:1, Informative)
If your not on someone's LAN how is this useful?
I can see it could be used on some insecure wireless access point, but unless you got root to my box your not GOING to run CAIN and ABLE.
So yes, for some people with insecure "convenience wireless networks" or "Convenience lan party" this could be a problem. But those same idiots are a good target for attacking other targets with TOR.
For JOE 6-PACK with the 10/100 lan and TRUSTED family this is a non-issue.
For JANE 6-PACK with the direct dialup, this is a non
It gets better (Score:5, Insightful)
Re: (Score:2)
banks. (Score:2)
Take the Chase.com [chase.com] homepage. It's got a login form right there (it doesn't matter if it's secure or not). If you were a victim of a man in the middle attack, the attacker could have rewritten the page to link to a different secure login server. Or, for example, could put in a different phone number to contact them.
Luckly some banks are FINALLY switching to all https, bankofamerica.com for exampl
ARP cache posioning can work even with SSL (Score:1)
Re: (Score:2)
slow news day? (Score:1)
what's happening to
Are all these 'caturday!1!' pics i see around the web numbing my