WebApp Sec mailing list archives
Re: Article - A solution to phishing
From: Robert Hajime Lanning <robert.lanning () gmail com>
Date: Wed, 1 Dec 2004 13:56:38 -0800
Well, SSL/TLS does not stop MITM. It will stop session snooping and hijacking, when the session is legit. What happens if I am tricked into going to the phishing site, then the phishing site (on my behalf) makes the SSL/TLS connection to the real site. They will now have all the information/connectivity they need to pull off the fake login. (by actually doing a real login in the background.) Without enduser education on checking valid site identifiers (SSL/TLS Cert and actual URL usage.) On Tue, 30 Nov 2004 07:43:57 -0800, Jeremiah Grossman <jeremiah () whitehatsec com> wrote:
I have spent a good amount time investigating the technical merits of the Passmark solution. While the system does have a few design / implementation problems, we shouldn't count man-in-the-middle attacks among them. As I understand the system Passmark thwarts MITM in two ways, SSL/TLS and Session Cookies. SSL/TLS Its recommended that this system is used over a secure encrypted connection. Hence no connection style MITM attacks. Session Cookies An attacker cannot directly access the image themselves because a valid Session Cookie is required. This cookie is acquired by the user early in the process by password verification. Second, the URL of the image is unguessable. Regards, Jeremiah- PS. Michael, kudos on your attempt to put forth a solution concept. Creative thought among the many minds here will find something workable. On Monday, November 29, 2004, at 07:20 PM, Michael Silk wrote:Hi Dave, Re "PassMark" ... This implementation is still easily susceptible to MITM attack ... The phishing site could simply take the Image from the real site. Not to mention the education issue ... Users could easily be fooled to completely forget about the image anyway: Example: ------------------------------------------------ Welcome User, IMPORTANT NOTICE: We have removed our image-authentication service due to security concerns. We have improved our login system to use "best practice ..." ... Username: [ ] Password: [ ] [ Login ] ------------------------------------------------ -- Michael -----Original Message----- From: Dave Jevans [mailto:djevans () teros com] Sent: Tuesday, 30 November 2004 6:35 AM To: Mark Burnett; webappsec () securityfocus com Subject: RE: Article - A solution to phishing Email authentication to prevent spoofing of email addresses will solve 85% of phishing attacks in their current form. At the Anti-Phishing Working Group we recommend a two-step adoption of SenderID/SPF and then email signing (most likely with Yahoo's Domain Keys or an IIM derivative). See more about this at http://truste.org/about/authentication.php Mark, you point out that authenticating a website to a consumer is necessary. www.passmarksecurity.com has an interesting image-based approach that requires no software or hardware on the end user machine. There are also a lot of things that can be done on the application security side to detect and reduce phishing. These include: - preventing cross-site scripting - detecting load spikes - preventing image referrals - detecting NDN bounce floods - detecting account takeovers - detecting phishing site testing prior to attack launch - application forensics Dave Night job: Chairman, Anti-Phishing Working Group. www.antiphishing.org Day job: Sr. VP, Teros. www.teros.com -----Original Message----- From: Mark Burnett [mailto:mb () xato net] Sent: Monday, November 29, 2004 8:15 AM To: webappsec () securityfocus com Subject: Re: Article - A solution to phishing I have been watching this thread with great interest and although the basic concept that Michael describes is interesting and might help reduce phishing, as others have pointed out it is still vulnerable to a number of other threats and heavily depends on a number of assumptions that might not be realistic. Nevertheless, the fundamental issue with phishing is not that an attacker can obtain your credentials, but that an attacker can trick a user into entering credentials in a fake web form. This is because it is easy to create a fake web site that looks exactly like the original and it is easy to direct the user to that site using deceptive links in e-mails, browser vulnerabilities, DNS spoofing or poisoning, ARP spoofing, stealth proxies, cross-site scripting, HOSTS file modification, bookmark modification, trojans, social engineering, etc. Protecting authentication credentials is also a problem, but the solution to phishing is more one of authenticating the site rather than authenticating the user. First solving the issue of authenticating the site makes it easier to solve the problem of authenticating the user. Mark Burnett ------------------------------------------------------------------ Hacking the Code: ASP.NET Web Application Security http://www.hackingthecode.com
-- END OF LINE -MCP
Current thread:
- Re: Article - A solution to phishing, (continued)
- Re: Article - A solution to phishing Michael Silk (Nov 29)
- RE: Article - A solution to phishing WebAppSecurity [Technicalinfo.net] (Nov 29)
- RE: Article - A solution to phishing Michael Silk (Nov 29)
- RE: Article - A solution to phishing Dave Jevans (Nov 29)
- RE: Article - A solution to phishing Dave Jevans (Nov 30)
- RE: Article - A solution to phishing WebAppSecurity [Technicalinfo.net] (Nov 30)
- RE: Article - A solution to phishing Michael Silk (Nov 30)
- Re: Article - A solution to phishing Jeremiah Grossman (Dec 01)
- Re: Article - A solution to phishing Adam Shostack (Dec 02)
- Re: Article - A solution to phishing [Passmark] Jeremiah Grossman (Dec 02)
- Re: Article - A solution to phishing Robert Hajime Lanning (Dec 02)
- Re: Article - A solution to phishing Jeremiah Grossman (Dec 01)
- Re: Article - A solution to phishing Michael Silk (Nov 29)
- RE: Article - A solution to phishing Michael Silk (Nov 30)
- Re: Article - A solution to phishing Jimi Thompson (Dec 01)
- RE: Article - A solution to phishing Damhuis Anton (Nov 30)
- Re: Article - A solution to phishing Marco Aurelio dos Santos (Dec 23)
- Re: Article - A solution to phishing Marco Aurelio dos Santos (Dec 23)
- Re: Article - A solution to phishing Michael Silk (Dec 28)
- Web Application Security Testing Procedures Lecia McCalla (Dec 30)
- Re: Web Application Security Testing Procedures HernĂ¡n M . Racciatti (Dec 30)
- Re: Web Application Security Testing Procedures Adam Tuliper (Dec 30)
- Re: Web Application Security Testing Procedures Saqib Ali (Dec 31)
- Web Application Security Testing Procedures Lecia McCalla (Dec 30)