Email and DNS Hacking 1 Overview Email Hacking

  • Slides: 15
Download presentation
Email and DNS Hacking 1

Email and DNS Hacking 1

Overview Email Hacking - Technology - Attacks - Phishing/Spearphishing/Whaling DNS Hacking - Technology -

Overview Email Hacking - Technology - Attacks - Phishing/Spearphishing/Whaling DNS Hacking - Technology - Attacks - Flux 2

Email Here is the program you’ve been waiting for. VIP@XXX. COM Trusted Colleague A

Email Here is the program you’ve been waiting for. VIP@XXX. COM Trusted Colleague A postcard written in pencil, with trusted cargo attached 3

How Email Works User Mail User Agent Mail Transfer Agent • • • Mail

How Email Works User Mail User Agent Mail Transfer Agent • • • Mail Transfer Agent 4

Simple Mail Transfer Protocol • • TCP/25 by default Transfer-agent based Text Protocol Single

Simple Mail Transfer Protocol • • TCP/25 by default Transfer-agent based Text Protocol Single connection, multiple messages (maybe) • Easily forged S: 220 smtp. example. com ESMTP Postfix C: HELO relay. example. org S: 250 Hello relay. example. org, I am glad to meet you C: MAIL FROM: <bob@example. org> S: 250 Ok C: RCPT TO: <alice@example. com> S: 250 Ok C: RCPT TO: <theboss@example. com> S: 250 Ok C: DATA S: 354 End data with <CR><LF> C: From: "Bob Example" <bob@example. org> C: To: Alice Example <alice@example. com> C: Date: Tue, 15 Jan 2008 16: 02: 43 -0500 C: Subject: Test message C: Hello Alice. C: Your friend, Bob C: . S: 250 Ok: queued as 12345 C: QUIT S: 221 Bye {The server closes the connection} 5

How Email Can Go Wrong Integration with OS User Mail User Agent Mail Transfer

How Email Can Go Wrong Integration with OS User Mail User Agent Mail Transfer Agent Dropped Message Malicious Software Preview & Download Weak Protocol Mail Transfer Agent Malicious Software Inserted Message • • • Mail Transfer Agent Intercepted Message User Mail User Agent Mail Transfer Agent Weak Protocol 6

Attacking Email Fool User Propagate Mail User Agent Mail Transfer Agent Subvert Flood Subvert

Attacking Email Fool User Propagate Mail User Agent Mail Transfer Agent Subvert Flood Subvert Mail User Agent Compromise Attach Mail Transfer Agent Extract • • • Mail Transfer Agent Insert Hijack 7

Social Engineering • Exploit trust relationships between people • Exploit service climate • Exploit

Social Engineering • Exploit trust relationships between people • Exploit service climate • Exploit business methods 8

Love Letter Virus Check out this joke. . . Exchange VIP@XXX. GOV Trusted Colleague

Love Letter Virus Check out this joke. . . Exchange VIP@XXX. GOV Trusted Colleague IRC Corrupt data/script files Replace • VBS • JPG • MP 3 • others Steal Passwords Clog email 9

Phishing example? Date: Tue, 20 Sep 2005 03: 06: 03 -0700 (PDT) From: Countrywide

Phishing example? Date: Tue, 20 Sep 2005 03: 06: 03 -0700 (PDT) From: Countrywide countrywide@email. countrywide. com To: tjs@cert. org Subject: Important Customer Correspondence [Image: "height="] [Image: "Countrywide - Full Speectrum Lending Division"] [Image: "1 -866 -227 -4118"] [Image: "height="] [Image: "If you could use some extra cash, Countrywide could make it easy. "] [Image: "Click Here to Get Started"] [Image: "height="] Dear Timothy, We can help customers get cash from the available equity they've built up in their homes by refinancing their mortgages ? and with the trend in rising home values, we estimate your home's equity may have increased to as much as $43, 867. 00. (much more…) Phone number appears legit, current mortgage holder Note typographical errors (Speectrum, empty images, etc. ) Big payoff offered Closer look: embedded domains doesn’t match from domain (m 0. net, r. delivery. net, not countrywide. com, all same ISP (Digital Impact)) 10

Domain Name System • More than just hostname → IP • Query hierarchy of

Domain Name System • More than just hostname → IP • Query hierarchy of nameservers – Local nameserver (resolver): answer from cache or preloaded resolutions, may do recursive queries – Authoritative nameserver: answer based on domains it covers, or recurse – Root nameserver: answer top-level, delegate, or generate errors 11

Name Server Protocol • UDP/53 or TCP/53 • Client queries local (address, ptr, mx,

Name Server Protocol • UDP/53 or TCP/53 • Client queries local (address, ptr, mx, ns, hinfo, any) • Local responds from cache or queries to root • Root responds with referral to TLD or error • Local queries TLD • TLD responds with referral to authority or error • Local queries authority • Authority sends answer • Local sends answer Query 12

Where DNS Can Go Wrong • Client Side – – – Cache Poisoning False

Where DNS Can Go Wrong • Client Side – – – Cache Poisoning False Response False Domains Compromise Tunneling • Server Side – Flooding – False Response – Compromise 13

Flux • Why would a domain change its resolution? • Why would a domain

Flux • Why would a domain change its resolution? • Why would a domain change frequently? • Why would a domain change transiently? 14

Summary • • • Common and needed protocols Many, many vulnerabilities Many, many attacks

Summary • • • Common and needed protocols Many, many vulnerabilities Many, many attacks Some systematic solutions (encryption) Trust 15