Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How do you exploit Hypertext Transfer Protocol Secure (HTTPS), tightly wrapped in SSL or TLS?

0
Posted

How do you exploit Hypertext Transfer Protocol Secure (HTTPS), tightly wrapped in SSL or TLS?

0

You don’t, says Moxie Marlinspike. You exploit the HTTP it’s built on. If you think about it, he told a Black Hat DC Briefings audience Wednesday, people encounter SSL by clicking on a link and being redirected to an HTTPS-secured page, when they log into banking, webmail or shopping websites. Marlinspike unveiled a hacking technique which intercepts Web traffic and tricks users into giving up passwords and other sensitive information. With the aid of a new tool called SSLstrip, Marlinspike demonstrated how easy it is to trick users that they are on a trusted, secure website. “People only encounter HTTPS via HTTP, so maybe we can think about starting by attacking HTTP,” he said. “Normally, if we’re doing man-in-the-middle attacks against SSL, we go straight for SSL, straight after that connection. But if SSL depends on this other protocol, why don’t we look at that first?” The trick, said Marlinspike, is duplicating a Web environment in which people are comfortable, in which they feel

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123