Presentation is loading. Please wait.

Presentation is loading. Please wait.

SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran

Similar presentations


Presentation on theme: "SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran"— Presentation transcript:

1 SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran

2 What is Man-in-the-Middle? It is an attack in which a Hacker places himself in between his potential victim and the host that victim communicates with He is able to see / manipulate all traffic sent between the two Because of the nature of the attack it has to happen at Layer 2

3 Tools of the Trade Atheros chipset based wireless card (preferred) Madwifi-NG drivers for setting card into AP mode Dnsspoof Utility to send spoofed DNS replies Delegated proxy server for performing SSL MITM

4 Attack Premise Victim Hacker Internet default I am the default AP DnsSpoof Delegated Hacker is connected to the Internet Hacker sets up a wireless Honeypot HONEYPOTHONEYPOT

5 Attack Steps Victim Hacker Internet default DnsSpoof Delegated HONEYPOTHONEYPOT DNS Request for mail.yahoo.com DNS Reply mail.yahoo.com at https://mail.yahoo.com Sends False Certificate Accepts Certificate Sends Authentication Data Forwards Data to the real Yahoo Server Forwards Reply from Yahoo back to Client

6 Delegated – A closer look Delegated Yahoo Victim SPOOFED CERTSPOOFED CERT YAHOOCERTYAHOOCERT Delegated Uses a self generated certificate to communicate with Client Delegated Uses Yahoos certificate to communicate with Yahoo servers

7 Demo We will recreate this entire setup and see the demo in the next video The video will feature the hack from a Victims perspective Basics of making the setup have been discussed in this video already Left as an exercise for the user to recreate the setup


Download ppt "SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran"

Similar presentations


Ads by Google