Man-in-the-middle ?
Results 1 to 8 of 8

Thread: Man-in-the-middle ?

  1. #1
    Member
    Join Date
    Aug 2004
    Posts
    36

    Man-in-the-middle ?

    I read the below description for man-in-the-middle attack -

    "The client (Bob) initiates a connection with the server (Alice). Unknown to both Bob and Alice, an attacker (Eve) is waiting to intercept their connection negotiation. Eve receives Bob's request for a connection and authenticates herself as Alice. Eve then initiates a connection with Alice posing as Bob and authenticates herself. Two secure SSH sessions are now in place with Eve reading all of the data being passed between Bob and Alice in clear text."

    How does Eve get the connection from Bob when Alice is supposed to get the request ?

  2. #2
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Eve is acting as a router. She intercepts the initial connection, (thus Bob never speaks directly to Alice), and then pretends to be Bob when talking to Alice. Anything Alice sends to Bob goes to Eve first who then passes it on to Bob so that Bob doesn't know he isn't talking to Alice....

    Clear as Mud?
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  3. #3
    Senior Member
    Join Date
    Jun 2002
    Posts
    394
    damn you Eve, always thwarting Alice and Bobs attempts at secure communication.

    Eve can "get the connection" by being connected to the same LAN or WLAN as Alice and Bob, with a NIC in promiscious mode. Normally the card will check the MAC address, see someone elses address and drop the frame. However, in promiscious mode, all packets will be accepted and passed to the higher layer protocols.

    actually, i read your thing wrong. the above example would allow Eve to pick up what the real Alice and Bob are saying to each other. this is still considered a man-in-the-middle attack. from your example, Eve is actually posing as Alice and Bob to Bob and Alice, respectively. Eve could "get the connection" in a number of ways, messing with DNS, address spoofing, perhaps Eve is working for the local ISP and has been tempted by "the Dark Side" (tm).

    Note that in the above example, Eve is able to authenticate as Bob or Alice. how is this possible? (rhetorical) Eve would need to know Alice and Bobs private keys to accomplish this, if a public-key crypto system was used.
    Hmm...theres something a little peculiar here. Oh i see what it is! the sentence is talking about itself! do you see that? what do you mean? sentences can\'t talk! No, but they REFER to things, and this one refers directly-unambigeously-unmistakably-to the very sentence which it is!

  4. #4
    Member
    Join Date
    Aug 2004
    Posts
    36
    Thanks. Clear.

  5. #5
    StOrM™
    Join Date
    Aug 2004
    Posts
    1,003
    Greeting's

    I have two question's about Man-In-The-Middle (MITM) attacks.

    1. Lets say I type hotmail.com in the address bar of my internet browser. Then I log-on to hotmail. Now right here at the type is it possible for amyone to watch and listen to the authentication request. What I mean is some what like sniffing but I want to know if this is possible without creating something that alerts me. (AFAIK there is something know as ARP storms but I do not know how they occur).

    2. I have successfully logged into hotmail and I am reading my mail at this point is it possible to read the mails to and send me wrong data (something other that what's the content of the mail). I also know that it is possible to inject commands in a present connection but this creats again, ARP storms (I have not a clue how they occur, I mean for what reasone).

    One more thing that I dont understand is how MITM can act as hotmail server (I above situation's) because would I know it from the active connections shown by lets say Netstat or Fport due the Mismatch of IP of Hotmail and the IP of MITM.
    Parth Maniar,
    CISSP, CISM, CISA, SSCP

    *Thank you GOD*

    Greater the Difficulty, SWEETER the Victory.

    Believe in yourself.

  6. #6
    Senior Member Maestr0's Avatar
    Join Date
    May 2003
    Posts
    604
    1. Unless your are using HTTPS (encrypted) then YES. HTTP is a plain text protocol. Your authentication between you and hotmail is sent naked as a jaybird down the wire. (This can easily be accomplished by anyone sniffing the traffic, no MITM is required)
    2. Unless you are using HTTPS, then YES. This could be accomplished several ways. If the attacker was situated in your route he could act as a transparent proxy between you and your web requests, or the traditional ARP posioning (if on your segment) could be used to route all your traffic through himself, just to name two ways.

    Could you tell? Maybe. If your ARP cache was poisoned and you actually knew what device the attacker was masquerading as, and what its IP should be then yes. If he were just acting as a transparent proxy along the route, then probably not, injecting data into the requests or the returns would be trivial. Of course if you suspected this was happening there are ways to tell, but I dont think it would be immediately apparent if you weren't looking.

    -Maestr0
    \"If computers are to become smart enough to design their own successors, initiating a process that will lead to God-like omniscience after a number of ever swifter passages from one generation of computers to the next, someone is going to have to write the software that gets the process going, and humans have given absolutely no evidence of being able to write such software.\" -Jaron Lanier

  7. #7
    Senior Member
    Join Date
    Dec 2003
    Location
    Pacific Northwest
    Posts
    1,675
    A Man-in-the-Middle Attack!

    Oh no! Say it isn’t so Mister Wizard. How is this possible?? Yes Tudor Turtle it is true. And a classic example is in the using of asymmetric encryption. Drunken Alice and Bobbling Bob went to all the trouble to create their keys and the algorithm was strong, but yet they didn’t secure the keys to their kingdom. They exchanged the keys in a non-secure method and Evil Evetress intercepted them. Now that evil vixen can modify, decrypt, and reencypt all of Alice’s and Bobs most private conversations! What can be done now Mister Wizard? Young Tudor, they must stop using the existing keys and make a new set. And of utmost importance is to pass them over a trusted channel. Even if the Evil Evetress can intercept their conversations as long as she does not get the keys, and Alice and Bob change them frequently, their secrets will be safe. Oh Mister Wizard, I want to come home!

    "Drizzle drazzle drozzle drome-- Time for this one to come home!"

    (Characters are from the “Tudor Turtle Show”)

    Connection refused, try again later.

  8. #8
    Member
    Join Date
    Aug 2004
    Posts
    34
    I am not sure the details on how to do it. But i have seen some domain (DNS) hijack incident that victim's yahoo.com actually pointing a different site and everything he enter there is being log down and re-transmited to the real yahoo.com. And the real respond from yahoo.com forwarded back to victims workstation. Hence all the login account, password (in clear text) is being capture.

    It could have come from a trojan itself.

    (Just my two cents worth, correct me if i am wrong)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •