Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Security

Submission + - New attack exploits virtually all intranets, VPNs (threatpost.com) 1

redsoxh8r writes: Security researcher Robert Hansen, known as Rsnake, has developed a new class of attacks that abuses a weakness in many corporate intranets and most browsers to compromise remote machines with persistent JavaScript backdoors. Threatpost reports: "The attacks rely on the long-term caching policies of some browsers and take advantage of the collisions that can occur when two different networks use the same non-routable IP address space, which happens fairly often because the amount of address space is quite small. The bottom line is that even a moderately skilled attacker has the ability to compromise remote machines without the use of any vulnerability or weakness in the client software. "If you're even vaguely clever, developing this might take you two hours. It's not that difficult," said Robert Hansen, the researcher who wrote about the attacks in a white paper published this week, called "RFC1918 Caching Security Issues."

Comment Re:I think they've already solved this... (Score 0, Offtopic) 500

Who said anything about using public hotspots for secure transactions? Always a bad idea.

That said, the best way I've found to work around this limitation is to have an SSH server on my box at home, and set up my laptop to tunnel all my web traffic over SSH to my desktop. Any MITM attacks are then easily detected, because any potential attacker would have to present a different public key to either side, and SSH will report the probable MITM and exit. It also encrypts all traffic until it gets to your home network, preventing any packet sniffing. Here's a short tutorial I wrote up on the topic, it's a lot easier than you'd think: http://spareclockcycles.wordpress.com/2009/04/10/ssh-secure-browsing-via-socks-proxy/

Comment Re:Use Handbrake (Score 1) 501

You have missed something:P. All DVDs are encrypted via what's known as CSS, a very weak encryption but an encryption nonetheless. On Linux, libdvdcss will take care of that decryption for you transparently, but you do need to already have it installed for any of these ripping tools to work (including Handbrake). On Windows, you need to get something like AnyDVD or DVD43 to decrypt the DVD for you.

Comment Re:To hire or to jail, that is the question (Score 5, Insightful) 145

No offense, but having a good understanding of XSS attacks at 17 doesn't exactly equate to the mathematical and analytical abilities of Edward Dijkstra. I know I don't put myself anywhere near that level. In fact, I'd argue that the chances are well in favor of him doing something like this again, except worse, rather than his becoming someone who does something beneficial for the world. I mean, look at all the attention he has gotten for this. Imagine what would happen if he does something worse! Punish him now, make him understand the gravity of his actions.

Comment Re:Alternatives (Score 1) 208

While telltale signs of the switch remain â" the Web address starts with HTTP rather than HTTPS â" most users do not even notice.

http://www.securityfocus.com/brief/910

From everything I've read about this attack, it does not present an https:/// URL on unencrypted traffic, just attempts to trick you into thinking it is encrypted by covertly changing all the https:/// links to http:/// and presenting a padlock favicon on supposedly encrypted sites. It mainly relies on the hope that you don't notice the http:/// link. I would be interested to hear where you have seen otherwise though.

Comment Re:Alternatives (Score 1) 208

If you're using Firefox, unlike in the demonstration shown on the sslstrip site, it will show you where the link on a button goes to. Make sure that the mouseover link says https:/// and you should at least be better off. Although, then you can start doing things with javascript to change what the mouseover property displays, so there's still room for an attack I guess. Like I said, better to just make sure that there isn't a MITM and its not a problem.

On a side note, I did notice though that Bank of America (a site he showed off the attack on) has since made their home page SSL encrypted. Good for them.

Slashdot Top Deals

APL hackers do it in the quad.

Working...