13
Man-in-the-Middle Attack Demo Presented by: Stan Engelbrecht Scott Lukasek

MITM attack demov2

Embed Size (px)

Citation preview

Page 1: MITM attack demov2

Man-in-the-Middle Attack Demo

Presented by:

Stan EngelbrechtScott Lukasek

Page 2: MITM attack demov2

Introductions

– Stan Engelbrecht, 4th year CIS student •  Concentration: Network & Security

•  Background –  Linux / Windows based systems administration –  3 years in IT and End-user support –  Extensive experience in Troubleshooting

Page 3: MITM attack demov2

Introductions

– Scott Lukasek, 4th year CIS student •  Concentration: Security •  Minor: Communications

•  Background –  Linux, Mac OS X, Windows based system administration –  Java, Python, C, C++, Bash, Shell, and HTML programming –  10 years Project Management / Estimator

Page 4: MITM attack demov2

Points of Discussion

– Relevancy – Basic Script Explanation

•  Contributions by: –  Timo Francke, Adrian Van Gemerden, Scott Lukasek

– Sslstrip Man-in-the-Middle Attack Demo – HSTS Mitigation Man-in-the-Middle

Attack Demo – Concluding Remarks – Q&A

Page 5: MITM attack demov2

Relevancy

– Ubiquitous internet access – Expected free WiFi – Lack of security – Gustav Nipe

Page 6: MITM attack demov2

Script – Airbase

Page 7: MITM attack demov2

Script – Sslstrip

Page 8: MITM attack demov2

Script – Ettercap

Page 9: MITM attack demov2

Demo - Simple

Page 10: MITM attack demov2

Mana-toolkit

– Developed by researchers from Sensepost:

• Dominic White and

• Ian de Villiers

Page 11: MITM attack demov2

Demo – HSTS Mitigated

Page 12: MITM attack demov2

Concluding Remarks –  Pay attention to the URL

•  Make sure that you see https://

» If it looks odd… don’t blindly trust your

connection

Page 13: MITM attack demov2

Q & A Stan Engelbrecht - [email protected] Scott Lukasek - [email protected]