[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Five Ways to Screw Up SSL
- To: "Dude VanWinkle" <dudevanwinkle@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Five Ways to Screw Up SSL
- From: "Brian Eaton" <eaton.lists@xxxxxxxxx>
- Date: Tue, 23 May 2006 10:35:31 -0400
On 5/23/06, Dude VanWinkle <dudevanwinkle@xxxxxxxxx> wrote:
I guess you would hijack their machines with a bug that would edit the
local cache, refresh the cache, then report to you about the websites
the victim's machine had visited, and you could request an ssl cert
for those sites.
If you can get this far, why not just trojan IE and be done with it?
http://isc.sans.org/presentations/banking_malware.pdf
The only problem I see with this scenario from a freessl perspective
is that they require verification in the form of an email sent to
admin@xxxxxxxxxx or from an email sent to the admin from the upstream
DNS provider. This would be a little tricky to get around as you would
have to munge freessl's DNS records.
This implies that you trust every server that relays the e-mail.
Regards,
Brian
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/