30 de ago. de 2020

TLS-Attacker V2.2 And The ROBOT Attack

We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org

Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.

Bleichenbacher's attack from 1998

In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.

OK, so what is new in our research?

In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.

In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.

For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.

Release of TLS-Attacker 2.2

These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2

TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
More articles
  1. Pentest Tools Tcp Port Scanner
  2. Easy Hack Tools
  3. Ethical Hacker Tools
  4. Hacking Tools Kit
  5. Hacking Tools For Windows
  6. Hacker Tools Mac
  7. What Is Hacking Tools
  8. Best Pentesting Tools 2018
  9. Hack Tools For Games
  10. Pentest Tools List
  11. Hack Rom Tools
  12. Hacker Tools 2020
  13. Hacker Tools For Mac
  14. Hacking Tools Download
  15. Pentest Tools Github
  16. Pentest Box Tools Download
  17. Tools For Hacker
  18. Hack Tools 2019
  19. Hack Tools Download
  20. Hack Tools For Games
  21. Hacker Techniques Tools And Incident Handling
  22. Pentest Tools Github
  23. Hacking Tools Kit
  24. Hacking Tools For Windows Free Download
  25. Pentest Tools Online
  26. Wifi Hacker Tools For Windows
  27. What Is Hacking Tools
  28. Hacker Hardware Tools
  29. Underground Hacker Sites
  30. World No 1 Hacker Software
  31. Hackers Toolbox
  32. Hacker Tools Apk
  33. Pentest Tools Find Subdomains
  34. Pentest Tools Apk
  35. Hacker Tools Mac
  36. Pentest Tools Apk
  37. Pentest Tools Website
  38. Hacking Tools Free Download
  39. Pentest Tools Android
  40. Pentest Tools Find Subdomains
  41. Pentest Tools List
  42. How To Make Hacking Tools
  43. Hacking Tools For Kali Linux
  44. Best Hacking Tools 2020
  45. Pentest Recon Tools
  46. Kik Hack Tools
  47. Hacker Tools 2020
  48. New Hack Tools
  49. Hackers Toolbox
  50. Physical Pentest Tools
  51. Hack Tools For Ubuntu
  52. Hacking Tools Online
  53. Hacking Tools For Windows
  54. Hacker Tools List
  55. Best Hacking Tools 2020
  56. Hacker
  57. Pentest Automation Tools
  58. Pentest Tools Windows
  59. Kik Hack Tools
  60. Pentest Tools Download
  61. Pentest Tools Free
  62. Hack Tools Mac
  63. Hack Tools For Pc
  64. Pentest Tools Online
  65. Nsa Hack Tools Download
  66. Pentest Tools Website Vulnerability
  67. Hack Tools Download
  68. Pentest Tools For Windows
  69. Hacking Tools For Windows 7
  70. Pentest Box Tools Download
  71. Game Hacking
  72. Github Hacking Tools
  73. Bluetooth Hacking Tools Kali
  74. Pentest Tools Linux
  75. Pentest Tools Apk

WiFiJammer: Amazing Wi-Fi Tool


The name sounds exciting but really does it jam WiFi networks? Yes, it is able to do the thing which it's name suggests. So today I'm going to show you how to annoy your friend by cutting him/her short of the WiFi service.

Requirements:


  1. A computer/laptop with WiFi capable of monitoring (monitor mode).
  2. A Linux OS (I'm using Arch Linux with BlackArch Repos)
  3. And the most obvious thing wifijammer (If you're having BlackArch then you already have it).


How does it work? You maybe thinking!, it's quite simple it sends the deauth packets from the client to the AP (Access Point) after spoofing its (client's) mac-address which makes AP think that it's the connected client who wants to disconnect and Voila!

Well to jam all WiFi networks in your range its quite easy just type:

sudo wifijammer



but wait a minute this may not be a good idea. You may jam all the networks around you, is it really what you want to do? I don't think so and I guess it's illegal.

We just want to play a prank on our friend isn't it? So we want to attack just his/her AP. To do that just type:

sudo wifijammer -a <<AP-MAC-ADDRESS>>

here -a flag specifies that we want to jam a particular AP and after it we must provide the MAC-ADDRESS of that particular AP that we want to jam.
Now how in the world am I going to know what is the MAC-ADDRESS of my friend's AP without disturbing the other people around me?
It's easy just use the Hackers all time favorite tool airodump-ng. Type in the following commands:

sudo airmon-ng

sudo airodump-ng

airmon-ng will put your device in monitor mode and airodump-ng will list all the wifi networks around you with their BSSID, MAC-ADDRESS, and CHANNELS. Now look for your friend's BSSID and grab his/her MAC-ADDRESS and plug that in the above mentioned command. Wooohooo! now you are jamming just your friend's wifi network.

Maybe that's not what you want, maybe you want to jam all the people on a particular channel well wifijammer can help you even with that just type:

sudo wifijammer -c <<CHANNEL-NUMBER>>

with -c we specify to wifijammer that we only want to deauth clients on a specified channel. Again you can see with airodump-ng who is on which channel.

wifijammer has got many other flags you can check out all flags using this command that you always knew:

sudo wifijammer -h



Hope you enjoyed it, good bye and have fun :)
Continue reading

UserRecon Tool | Find Usernames | OSINT Tool

Continue reading
  1. Best Hacking Tools 2020
  2. Hack Tools For Mac
  3. Pentest Tools For Windows
  4. Pentest Tools Open Source
  5. Hacking Apps
  6. Hacking Tools For Beginners
  7. Hack Tool Apk No Root
  8. Pentest Automation Tools
  9. Tools For Hacker
  10. Pentest Tools Download
  11. Hacking App
  12. Hack Tools Download
  13. World No 1 Hacker Software
  14. Pentest Tools For Ubuntu
  15. Tools For Hacker
  16. What Are Hacking Tools
  17. Pentest Tools For Ubuntu
  18. What Are Hacking Tools
  19. Wifi Hacker Tools For Windows
  20. Hack Tools Mac
  21. Hack Tools Mac
  22. Pentest Tools Port Scanner
  23. Hack Tools
  24. Wifi Hacker Tools For Windows
  25. Pentest Tools Website
  26. Android Hack Tools Github
  27. Ethical Hacker Tools
  28. Pentest Tools Nmap
  29. Hacker Tools Apk Download
  30. Kik Hack Tools
  31. Hacker Tools Online
  32. Nsa Hack Tools Download
  33. How To Install Pentest Tools In Ubuntu
  34. Tools Used For Hacking
  35. Hack Rom Tools
  36. Hack Tools For Windows
  37. Bluetooth Hacking Tools Kali
  38. Hack Tools For Ubuntu
  39. Easy Hack Tools
  40. Pentest Tools Open Source
  41. Hacks And Tools
  42. Hacking Tools For Pc
  43. Pentest Tools Subdomain
  44. Hacker Tools List
  45. Blackhat Hacker Tools
  46. Android Hack Tools Github
  47. Pentest Tools Port Scanner
  48. Hacking Tools Usb
  49. Top Pentest Tools
  50. Hack Rom Tools
  51. Hacking Tools For Mac
  52. Hacker Techniques Tools And Incident Handling
  53. Pentest Tools Website Vulnerability
  54. Free Pentest Tools For Windows
  55. Hack Tools For Ubuntu
  56. Hack Tool Apk
  57. Hacker Tools Windows
  58. How To Hack
  59. Hacker Tools 2019
  60. Hack Tools For Games
  61. Install Pentest Tools Ubuntu
  62. Hack App
  63. Hak5 Tools
  64. Pentest Tools Kali Linux
  65. Hack Tools For Pc
  66. Pentest Box Tools Download
  67. What Is Hacking Tools
  68. Hacking Tools Online
  69. Pentest Tools Url Fuzzer
  70. Free Pentest Tools For Windows
  71. Hacker
  72. Pentest Tools Website Vulnerability
  73. Hack Tools For Mac
  74. Hacker Techniques Tools And Incident Handling
  75. Hacker Tools For Windows
  76. Pentest Tools Kali Linux
  77. Hack Tools 2019
  78. Hacker Tools Hardware
  79. Pentest Tools Free
  80. Hack Rom Tools
  81. Nsa Hack Tools Download
  82. Hacks And Tools
  83. Install Pentest Tools Ubuntu
  84. Pentest Tools Subdomain
  85. Hacking Tools Hardware
  86. Github Hacking Tools
  87. Growth Hacker Tools
  88. Pentest Tools For Android
  89. Pentest Tools
  90. Hacker Tools For Windows
  91. Kik Hack Tools
  92. Pentest Tools
  93. Hack And Tools
  94. Pentest Tools Framework
  95. Hacking Tools For Mac
  96. Pentest Tools Website Vulnerability
  97. Hacking Tools 2020
  98. Hacker Tools Apk
  99. Hacking Tools Kit
  100. Hacker Tools For Mac
  101. Black Hat Hacker Tools
  102. Pentest Tools List
  103. Pentest Tools For Windows
  104. Pentest Tools Port Scanner
  105. Hacking Tools 2020
  106. Hacking Tools Windows
  107. Pentest Automation Tools
  108. Hacker Tools Apk Download
  109. Hacker Tools Linux
  110. Hacker
  111. Hacker Tools Free Download
  112. Pentest Tools Free
  113. Hacking Apps
  114. Hacking Tools Mac
  115. Hacker Tool Kit
  116. Hacking Tools For Beginners
  117. Hacker Tools Apk
  118. How To Install Pentest Tools In Ubuntu
  119. Pentest Tools Nmap
  120. Nsa Hack Tools
  121. Pentest Tools Subdomain
  122. Growth Hacker Tools
  123. Free Pentest Tools For Windows
  124. Pentest Tools Subdomain
  125. Pentest Tools For Ubuntu
  126. Hacking Apps
  127. Hack Tools Online
  128. How To Install Pentest Tools In Ubuntu
  129. Termux Hacking Tools 2019
  130. Hacker Tools
  131. Easy Hack Tools
  132. Hacker Tools For Windows
  133. Android Hack Tools Github
  134. Hack And Tools
  135. Best Hacking Tools 2019
  136. Game Hacking
  137. Hackrf Tools
  138. Free Pentest Tools For Windows
  139. Hack Tool Apk
  140. Hacker Security Tools
  141. Hacking Tools For Kali Linux
  142. Pentest Tools Nmap
  143. Hack App
  144. Hack Tools Pc
  145. Pentest Tools Windows
  146. Hacker Search Tools
  147. Pentest Tools List
  148. Pentest Tools Port Scanner
  149. Hacker Tools Online
  150. Hacker Tools Software
  151. Computer Hacker
  152. Hacking Tools Pc
  153. Hacking Tools And Software
  154. Pentest Box Tools Download
  155. Hacking Tools Pc
  156. Hackers Toolbox
  157. Hacker Security Tools

29 de ago. de 2020

Change Passwords Regularly - A Myth And A Lie, Don'T Be Fooled, Part 2

In the previous blog post, I have covered the different passwords you have to protect, the attackers and attack methods. Now let's look at how we want to solve the issue.

Password requirements

So far we have learned we have to use long, complex, true random passwords. In theory, this is easy.
Now, this is my password advice for 2014:

Password character classes
Use upper-lower-digit-special characters in general cases.
If you don't understand what I just write, choose from this:
qwertyuiopasdfghjklzxcvbnmQWERTYUIOPASDFGHJKLZXCVBNM0123456789-=[];'\,./<>?:"|{}_+!@#$%^&* ()`~
If you are a CISO, and say: use 3 out of 4 character class, everyone will use Password12 or Welcome12 as their password (after the 12th enforced password change).

Password length
This is basically the only thing which changes whether the password is in the very high/high/medium/low level. Check the previous blog post for the details about very high/high/medium/low level.

Password length: Very high level class (including work-related/enterprise passwords)
15 character (or 20 if you are really paranoid). Making true random passwords longer than 20 characters usually does not make any sense, even in high security scenarios (e.g. military, spy agencies, etc.). 15 character in Windows environment is a right choice, as LM hash is incompatible with 15 character passwords, thus one (effective) attack won't work. Beware, there might be bugs with using 15 character passwords, with a low probability.

Password length: High-level class
12 character, upper-lower-special characters

Password length: Medium class
10 character, upper-lower-special characters, still TRUE random

Password length: Low-level class
9 character. Why less?

Pin codes
Always choose the longest provided, but a maximum of 8. Usually, more is pretty impractical.

Password randomness
True random, generated by a (local) computer. Avoid Debian. Avoid random generated by your brain. Do not use l33tsp33k. Do not append or prepend the current month, season or year to a word. Do not use Star Wars/Star Trek/(your favorite movie/series here) characters or terminology. In general, avoid any pattern like the above ones. The chances that a true random password generator generates SkyWalker12 is very-very low. And believe me, it is not that hard to crack those. Every algorithm that you would come up with; the bad guys have already thought of it. Use true random. Let the computer do it for you. See details later in this post.

Password history
Never-ever reuse passwords. NEVER!

Password change period
If it is not enforced otherwise, don't bother to change it twice in a year. But! Check if the password cracking speed made your current ones obsolete. If yes, change the obsolete passwords. Immediately change the password if you have been notified that the service you use has been compromised. Immediately change all of your recently used passwords if you suspect malware was running on your computer (do this on a known clean computer). Immediately change your password if you have used it on a computer you don't own, or there is a small chance malware is running on it. Change it if you really had to give your password to someone. Otherwise, goodbye regular password change. We will miss you...

If you are a CISO, and writing security policies, you should have to enforce the password change period based on: do you allow LM hashes? What is the password length requirement for users and administrators? What is the current hash cracking speed, and the forecast for the next 2 years? I think people would be happy to increase their passwords with 1-2 characters, if they are not forced to change it frequently (e.g. every month).
Now after I was sooo smart giving advises people still hate to implement, let's see the practical implementations. At least some people might like me, because I told them not to change the passwords regularly. Next time someone tells you to change all your important passwords regularly, put a lie detector on him, and check if he changes all of his passwords regularly. If he lies, feel free to use the wrench algorithm to crack his passwords. If he was not lying, call 911, to put a straitjacket on him. Only insane paranoid people do that in reality. Others are just too scared to say "what everyone recommended so far is bullshit". Comments are welcome ;) Other people might hate me for telling them using true random passwords. Don't panic, keep reading.
And don't forget to use 2 factor authentication. It might seem a bit of an overkill at the beginning, but after months, you won't notice using it.

(Bad and good) solutions

I will use the same password everywhere

This is a pretty bad idea. If one of the passwords are compromised, either the attackers can access your other sites, or you have to change all of your passwords. There are better ways to spend your life on earth than changing all of your passwords.

I will remember it

Good luck remembering 250 different, complex passwords. Don't forget to change them regularly! ;)

I will use the password recovery all the time

Not a very user-friendly solution. And because the security answer has to be as complicated as the password itself, the problem has not been solved.

I will write it down into my super-secret notebook and put it in my drawer

Although it might work in some cases, it won't work in others. I don't recommend it.





I will use an algorithm, like a base password, and add the websites first letters to the end of the password

Still better than using the same password everywhere, but believe me, if this is a targeted attack, it is not that hard to guess your password generation algorithm.

I will use the advice from XKCD, and use the password correcthorsebatterystaple

Still a lot better than simple passwords, but unfortunately, people are still bad at choosing random words with random order, so it is not the best solution. And again, you can't memorize 250 different passwords ... Even 10 is impossible. Only use this method in special corner cases (see details later), and use a passphrase generator!

I will use a password manager

This is the very first good idea. It solves the problem of remembering 250 different complex and random passwords. Some people might complain about using a password manager, here are those complaints. And my answers:

If someone gets access to this one password store, all is lost.
Answer: If someone accessed your password store, and the master password, you can be pretty damn sure that most of your passwords are already stolen. For extra paranoids, you can use multiple password stores, one for daily use, one for rare cases. Beware not to forget the password for the second one ;)

What if I don't have access to the password store when I need it?
Answer: In the age of cheap notebooks, tablets, and smartphones, in 99% of the cases you should not use that important password on any other device than yours. In the rare cases when you must, you can use either your smartphone to get the password, or use a browser extension like Password hasher to generate different passwords to different websites, with one password. For extra paranoids, you can have different master passwords for the different security levels. And don't forget to change the password after you are back at your own computer.

What if I forgot the one password to the password store?
Answer: If you use your password manager daily, it has the same odds to forget that one password as it is to forget every one of your passwords.

Password managers make phishing attacks easier.
Answer: Who started this nonsense? Good password managers decrease the risk of phishing.

Password managers have the same vulnerabilities as other websites or software.
Answer: Well, this is partially true. There are at least 3 types of password managers, from most secure to least: offline, browser built-in, online. Online password managers give better user experience, with a sacrifice in security. But if you choose one of the leading password managers, and you are a simple home user, the risks are negligible. If you try to store your work password in an online password store, you might violate your internal security policy. For paranoids, use offline password managers, and back them up regularly. If you choose an online password manager, at least use 2-factor authentication. And don't forget, your Chrome password can be easily synchronized to the cloud, shifting it to the online category.

In some cases, like Full Disc Encryption, OS login, smartphone login, or password manager login, the auto-type of password from the password manager is not available, thus choosing a true random password is a pain in the a$$.
Answer: True. Generate pronounceable passwords or passphrases in these corner cases, e.g. with the Linux tool apg you can generate pronounceable passwords. For easy and fast type, don't use capital letters (only lower-alpha - digit - special) in the original password, but increase the length of the password. Add 1 extra character because you don't use upper case letters, add 3 other because it is a pronounceable password, and you are good to go. For extra paranoids change one or two of the letters to uppercase where it is convenient. 
apg -M SNL -m 15 is your friend.
If you want to check what I write here (always a good idea), test the entropy of a true random 10 character password with all character classes, and check it with 14 characters, without uppercase. I recommend KeePass for that. If you comment on this that "Keepass can not measure that it is a pronounceable password, thus the entropy is lower in reality", my answer is: "Check out the current passwords used by users, and current password advises, and tell me if this password is a lot better or not ..." . You have been warned.
 

For the high-level password class, I don't recommend anything your brain generated. There are also suitable offline passphrase generators. Use at least 5-6 words for passphrases.

Password managers are not user-friendly, it takes more time to log in.
Answer: If you set auto-type/auto-fill, and the password manager is opened once a day (and you lock your computer when you leave it), in this case, logging in takes less time than typing it! It is more convenient to use it, rather than typing the passwords every time.

I like to create new unique passwords every time I create a new account, and password managers take the fun away from it.
Answer: Said no one, ever! "38 percent of people think it sounds more appealing to tackle household chores – from folding the laundry to scrubbing toilets – than to try and come up with another new user name or password."

To summarize things. Use a password manager.

General advise

Never use your essential passwords on other computers. They might be infected with a password stealer. If you really have to use it, change the password as soon as possible on a trusted (your) computer.

Don't fool yourself by phishing sites. If you go to the local flea market, and there is a strange looking guy with "Superbank deposit here" logo above his head, will you put your money?

Protect yourself against malware. Use a recent operating system, and even if you use OSX or Linux, it is not a bad thing to have an AV as a "last line of defense". Or to check your pendrive for Windows USB worms.

Never-ever use online web sites to "generate your password", "measure the complexity of your password" or "check if it has been breached". Never! (Except if it is your password manager :) ... )

Update: Sign up on the https://haveibeenpwned.com/ for notification if your e-mail is found in a leak.

Changing passwords frequently is bad advice. It is not effective. Put more energy in other right password advise. 
Continue reading