This morning, while I had a few spare minutes, I went ahead and set up a test based on one of the earlier labs I did in my Security+ class. This lab had to do with ARP spoofing (also known as ARP flooding), and the potential for damage it can cause.
What is ARP spoofing? Well, first, one needs to know a little about networks and ARP. ARP is the address resolution protocol. Simply put, it's the mechanism by where a particular computer knows exactly where it is on a network, as well as its neighbouring nodes. ARP maps a host to a particular computer's unique MAC address and each computer stores it in a table.
ARP spoofing, then, is where a malicious user (let's call this user/group Moriarty for simplicity) running a machine manages to insert himself on a given local area network (LAN) at a point where they are able to intercept packets coming from targeted/victimised hosts while said packets are en route to the router, and ultimately its destination on the Internet. Very often, there isn't a lot of noticeable detection for a casual user.
This can lead to several major attacks such as:
a.) data theft, such as website credentials or other equally-sensitive data being transmitted
b.) "man-in-the-middle", wherein Moriarty is able to inject or otherwise modify the data that is being transmitted
c.) internal denial-of-service (DoS), which represents loss of connectivity for its victims
The equipment I used in this simulation were both virtual machines:
1.) BackTrack 5 (KDE 32-bit), which is a Linux-based pentesting distribution currently based on Ubuntu 10.04 LTS and the current release.This was the "attacking" PC that was directly connected to the LAN at 10.14.252.26/22
2.) Windows Vista Enterprise with Service Pack 2, which represented the "victim" and on the same LAN segment, having an IPv4 address of 10.14.252.27/22
I used three sites in my test, where I have or have had accounts: Google's Gmail service, Windows Live, and OkCupid. Of the three, only Gmail explicitly used HTTPS encryption for its logins.
After configuring SSLdump and the appropriate IP commands (IPv4 forwarding and iptables), I went to the victim box and logged in successfully to each of the sites. On the attacking machine, the credentials were logged to a text file I called "secret."
Below is the entire output of the file called "secret", noting that I have removed my username and passwords by obscuring them with XXXXXXXX. They represent the username and password values captured, but do not necessarily indicate the length or other attributes of the collected data.
2011-05-12 10:03:52,714 SECURE POST Data (www.google.com):
2011-05-12 10:03:56,259 POST Data (mail.google.com):
2011-05-12 10:03:56,693 POST Data (mail.google.com):
2011-05-12 10:03:57,120 POST Data (mail.google.com):
2011-05-12 10:03:57,403 POST Data (mail.google.com):
2011-05-12 10:03:57,404 POST Data (mail.google.com):
2011-05-12 10:03:58,180 POST Data (mail.google.com):
2011-05-12 10:03:58,884 POST Data (mail.google.com):
2011-05-12 10:03:59,278 POST Data (mail.google.com):
2011-05-12 10:03:59,528 POST Data (mail.google.com):
2011-05-12 10:04:00,098 POST Data (mail.google.com):
2011-05-12 10:04:00,200 POST Data (mail.google.com):
2011-05-12 10:04:00,348 POST Data (mail.google.com):
2011-05-12 10:04:01,328 POST Data (mail.google.com):
2011-05-12 10:04:21,575 POST Data (login.live.com):
2011-05-12 10:04:25,611 SECURE POST Data (login.live.com):
2011-05-12 10:04:30,546 POST Data (ocsp.verisign.com):
2011-05-12 10:04:44,810 POST Data (www.okcupid.com):
2011-05-12 10:04:50,087 SECURE POST Data (www.okcupid.com):
2011-05-12 10:04:52,271 POST Data (www.okcupid.com):
2011-05-12 10:04:53,638 POST Data (www.okcupid.com):
2011-05-12 10:05:04,644 POST Data (www.okcupid.com):
2011-05-12 10:05:06,472 POST Data (www.okcupid.com):
I have some recommendations, such as wider support for true multi-factor authentication (such as incorporating secured tokens using a strong cypher, biometrics, or using one-time PIN codes) for signon to these sites. Already there are some banks and even the popular World of Warcraft game series implement these as security measures. The questions remains: what is stopping sites like Facebook, Windows Live, Gmail, the plethora of "dating" sites, and others that contain much of our personal (and perhaps outrightly intimate) data from going these routes? Is not increasing security for users a good thing?