11
Christopher M. Shields r00t0v3rr1d3 Ma1hew M. Toussain 0sm0s1z

DefCon 2012 - Subterfuge - Automated MITM Attacks

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: DefCon 2012 - Subterfuge - Automated MITM Attacks

Christopher  M.  Shields    r00t0v3rr1d3  

   Ma1hew  M.  Toussain    

 0sm0s1z    

Page 2: DefCon 2012 - Subterfuge - Automated MITM Attacks

Chris – Custom Attack Tools and Project Management

Matt – Interface Design and Framework Development

Page 3: DefCon 2012 - Subterfuge - Automated MITM Attacks

Basic ARP Poison

Page 4: DefCon 2012 - Subterfuge - Automated MITM Attacks

Heavy Network Traffic

Periods of MITM Loss

Python Tool With Scapy

Intelligent Network

Poison

Dynamic Poison Retention

Page 5: DefCon 2012 - Subterfuge - Automated MITM Attacks

Ø HTTPS Downgrade Attack Ø Use as a Web Proxy Ø Customizations for Subterfuge

Page 6: DefCon 2012 - Subterfuge - Automated MITM Attacks
Page 7: DefCon 2012 - Subterfuge - Automated MITM Attacks

A New MITM Tool –

Ø  Intuitive Interface Ø  Easy to use Ø  Silent and Stealthy Ø  Open Source

Page 8: DefCon 2012 - Subterfuge - Automated MITM Attacks

Ø  Server/Client Architecture Ø  MITM Utilities Ø  Module Builder Ø  Configuration Options

Page 9: DefCon 2012 - Subterfuge - Automated MITM Attacks

Ø Credential Harvesting Ø HTTP Code Injection Ø Denial of Service Ø Network View

Page 10: DefCon 2012 - Subterfuge - Automated MITM Attacks
Page 11: DefCon 2012 - Subterfuge - Automated MITM Attacks

? ? ?