Eevo Theme
   [ Main Page ][ First New  ]

Yeah
Security ]
Posted by voltaic on Wednesday August 14, 2013 @ 10:28am
>>reply ][ rating +0  ]

Gone in 30 seconds: New attack plucks secrets from HTTPS-protected pages
http://arstechnica.com/security/2013/08/gone-in-30-seconds-new-attack-plucks-secrets-from-https-protected-pages/

The HTTPS cryptographic scheme, which protects millions of websites, is susceptible to a new attack that allows hackers to pluck e-mail addresses and certain types of security credentials out of encrypted pages, often in as little as 30 seconds.

The technique, scheduled to be demonstrated Thursday at the Black Hat security conference in Las Vegas, decodes encrypted data that online banks and e-commerce sites send in responses that are protected by the widely used transport layer security (TLS) and secure sockets layer (SSL) protocols. The attack can extract specific pieces of data, such as social security numbers, e-mail addresses, certain types of security tokens, and password-reset links. It works against all versions of TLS and SSL regardless of the encryption algorithm or cipher that's used.

It requires that the attacker have the ability to passively monitor the traffic traveling between the end user and website. The attack also requires the attacker to force the victim to visit a malicious link. This can be done by injecting an iframe tag in a website the victim normally visits or, alternatively, by tricking the victim into viewing an e-mail with hidden images that automatically download and generate HTTP requests. The malicious link causes the victim's computer to make multiple requests to the HTTPS server that's being targeted. These requests are used to make "probing guesses" that will be explained shortly.

"We're not decrypting the entire channel, but only extracting the secrets we care about," Yoel Gluck, one of three researchers who developed the attack, told Ars. "It's a very targeted attack. We just need to find one corner [of a website response] that has the token or password change and go after that page to extract the secret. In general, any secret that's relevant [and] located in the body, whether it be on a webpage or an Ajax response, we have the ability to extract that secret in under 30 seconds, typically."


<< Re: Yeah
Security ]
Posted by Stealth on Monday August 19, 2013 @ 10:41pm
>>reply ][ rating +0  ]

It's a very creative method to get information using what you know/have. There would have to be a change in encryption or padding to help stop something like that.

"No training? To go to bed with a man and lie to him? She's a woman. She's got all the training she needs."


<< Re: Yeah
Security ]
Posted by Caliber on Thursday August 15, 2013 @ 08:16pm
>>reply ][ rating +0  ]

BS, no way they could get all that info before the nuke subs hit...


<< Re: Yeah
Security ]
Posted by rub on Wednesday August 14, 2013 @ 01:56pm
>>reply ][ rating +0  ]

wow... the pinkos and chinks are gonna have a field day with this


<< Re: Yeah
Security ]
Posted by voltaic on Wednesday August 14, 2013 @ 10:29am
>>reply ][ rating +0  ]

Interesting bug: I edited this article after posting it to change the italics tags, and upon saving the edit THCNet took me to this post (also entitled "Yeah").

"some tattoo artist ruined a perfectly good white girl." - krux


<< Re: Yeah
Security ]
Posted by Stealth on Monday August 19, 2013 @ 10:40pm
>>reply ][ rating +0  ]

Random little bugs are fun.


   [ Main Page ][ First New  ]