【24h】

Mitigating Man in the Middle Attack over Secure Sockets Layer

机译:缓解中间攻击的人在安全套接字层上

获取原文

摘要

Phishing is a social engineering mechanism to steal the user's credentials which are then used for identity theft leading to financial benefit. Currently majority of Phishing attacks are very unsophisticated as they focus on collecting just the credentials and do not try to validate in real time whether the received credentials are correct. It is obvious that next generation Phishing attacks will, in real time, try to check the credentials and also try to exploit the same. It is easy for a Phisher to behave as a man-in-the middle (MITM) between the user and the targeted site which is being phished. The problem with MITM attack is all the heuristics like monitoring domain name for special characters, using blacklists, page analysis etc, fail to restrict the Phisher. One of the significant literature available in this area i.e., PwdHash, which is successful for attacks when the user is on a URL other than genuine website. In this paper, we have proposed and implemented a novel approach to solve MITM over SSL which uses the genuine website URL. To tackle such attacks we propose hashing the user password with the public key of the server's digital certificate. This approach beats the MITM, since the MITM receives the hash of the original password which cannot be reused. We prove our concept with a browser plugin.
机译:网络钓鱼是一种社会工程机制,可以窃取用户的凭据,然后用于用于识别财务利益的身份盗窃。目前,大多数网络钓鱼攻击是非常难以置信的,因为他们专注于收集凭据,并且不会试图实时验证收到的凭据是否正确。很明显,下一代网络钓鱼攻击将实时地尝试检查凭据并尝试利用相同的凭证。 PhiSher可以易于表现为用户和被疫苗的目标网站之间的中间(MITM)。 MITM攻击的问题是所有的启发式,如监视特殊字符的域名,使用黑名单,页面分析等,未能限制PhiSher。该区域中可用的重要文献之一,即Pwdhash,当用户在真正网站以外的URL上时,这是成功的攻击。在本文中,我们提出并实施了一种新颖的方法来解决使用真正的网站URL的SSL。为了解决此类攻击,我们将使用服务器数字证书的公钥汇集用户密码。这种方法击败了MITM,因为MITM接收了无法重复使用的原始密码的哈希。我们通过浏览器插件证明了我们的概念。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号