160 likes | 332 Views
Email and DNS Hacking. Overview. Email Hacking - Technology - Attacks - Phishing/Spearphishing/Whaling DNS Hacking - Technology - Attacks - Flux. Email. Here is the program you’ve been waiting for. 33. VIP@XXX.COM. Trusted Colleague.
E N D
Overview Email Hacking - Technology - Attacks - Phishing/Spearphishing/Whaling DNS Hacking - Technology - Attacks - Flux
Email Here is the program you’ve been waiting for. 33 VIP@XXX.COM Trusted Colleague A postcard written in pencil, with trusted cargo attached
How Email Works User User Mail User Agent Mail User Agent Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent •••
Simple Mail Transfer Protocol S: 220 smtp.example.com ESMTP Postfix C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you C: MAIL FROM:<bob@example.org> S: 250 Ok C: RCPT TO:<alice@example.com> S: 250 Ok C: RCPT TO:<theboss@example.com> S: 250 Ok C: DATA S: 354 End data with <CR><LF>.<CR><LF> C: From: "Bob Example" <bob@example.org> C: To: Alice Example <alice@example.com> C: Date: Tue, 15 Jan 2008 16:02:43 -0500 C: Subject: Test message C: Hello Alice. C: Your friend, Bob C: . S: 250 Ok: queued as 12345 C: QUIT S: 221 Bye {The server closes the connection} • TCP/25 by default • Transfer-agent based • Text Protocol • Single connection, multiple messages (maybe) • Easily forged
How Email Can Go Wrong Integration with OS User User Malicious Software Preview & Download Mail User Agent Mail User Agent Weak Protocol Inserted Message Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent ••• Weak Protocol Intercepted Message Dropped Message Malicious Software
Attacking Email Fool User User Propagate Subvert Mail User Agent Mail User Agent Attach Compromise Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent Mail Transfer Agent ••• Insert Subvert Extract Flood Hijack
Social Engineering • Exploit trust relationships between people • Exploit service climate • Exploit business methods
33 33 33 Exchange IRC Love Letter Virus Check out this joke... 33 VIP@XXX.GOV TrustedColleague Corrupt data/script files Steal Passwords Clog email • VBS • JPG • MP3 • others Replace
Phishing example? Date: Tue, 20 Sep 2005 03:06:03 -0700 (PDT)From: Countrywide countrywide@email.countrywide.comTo: tjs@cert.orgSubject: Important Customer Correspondence [Image: "height="] [Image: "Countrywide - Full Speectrum Lending Division"] [Image: "1-866-227-4118"] [Image: "height="] [Image: "height="] [Image: "height="] [Image: "If you could use some extra cash, Countrywide could make it easy."] [Image: "Click Here to Get Started"] [Image: "height="] [Image: "height="] [Image: "height="] [Image: "height="] Dear Timothy, We can help customers get cash from the available equity they've built up in their homes by refinancing their mortgages ? and with the trend in rising home values, we estimate your home's equity may have increased to as much as $43,867.00. (much more…) Phone number appears legit, current mortgage holder Note typographical errors (Speectrum, empty images, etc.) Big payoff offered Closer look: embedded domains doesn’t match from domain(m0.net, r.delivery.net, not countrywide.com, all same ISP (Digital Impact))
Domain Name System • More than just hostname → IP • Query hierarchy of nameservers • Local nameserver (resolver): answer from cache or preloaded resolutions, may do recursive queries • Authoritative nameserver: answer based on domains it covers, or recurse • Root nameserver: answer top-level, delegate, or generate errors
Name Server Protocol Query Response • UDP/53 or TCP/53 • Client queries local (address, ptr, mx, ns, hinfo, any) • Local responds from cache or queries to root • Root responds with referral to TLD or error • Local queries TLD • TLD responds with referral to authority or error • Local queries authority • Authority sends answer • Local sends answer Query
Where DNS Can Go Wrong • Client Side • Cache Poisoning • False Response • False Domains • Compromise • Tunneling • Server Side • Flooding • False Response • Compromise
Flux • Why would a domain change its resolution? • Why would a domain change frequently? • Why would a domain change transiently?
Summary • Common and needed protocols • Many, many vulnerabilities • Many, many attacks • Some systematic solutions (encryption) • Trust