130 likes | 293 Views
Installing Fake Root Keys in a PC. Adil Alsaid and Chris J. Mitchell Information Security Group Royal Holloway, University of London. Contents. Introduction Installing Root Certificates A Practical Method for Silently Installing a Root Certificate Countermeasures. Introduction.
E N D
Installing Fake Root Keys in a PC Adil Alsaid and Chris J. Mitchell Information Security Group Royal Holloway, University of London
Contents • Introduction • Installing Root Certificates • A Practical Method for Silently Installing a Root Certificate • Countermeasures
Introduction • The attack • Motivation
Installing Root Certificates • Creating a Root Certificate • Installing Root Certificates under user control
Creating a Root Certificate makecert -r -n "CN=MyRootCA, OU=MyOrganization, O=CompanyName,E=Emailaddress" -sv root.pvk root.cer
General Approach to Silent Root Certificate Installation • Using standard tools • Writing directly to the root certificate store
A Practical Method for Silently Installing a Root Certificate • C++ and CryptoAPI • MS Windows message system
The Attack • The user executes a malicious applet • The malicious applet does the following: • Creates another running thread (Monitoring) • Makes a CryptoAPI function call to add the fake root certificates • Hides the ‘security warning’ message box by providing a positive answer • Now, the fake root certificate will be listed in the browser’s trusted root CAs list
Countermeasures • Proactive or preventative measures • Users re-authentication • Root public key store access restriction • Reactive measures • Scanning tool • OCSP • Verified and user added root keys