Thứ Năm, 18 tháng 1, 2024

ALPACA: Application Layer Protocol Confusion-Analyzing And Mitigating Cracks In TLS Authentication

In cooperation with the university Paderborn and Münster University of Applied Sciences, we discovered a new flaw in the specification of TLS. The vulnerability is called ALPACA and exploits a weakness in the authentication of TLS for cross-protocol attacks. The attack allows an attacker to steal cookies or perform cross-site-scripting (XSS) if the specific conditions for the attack are met.

TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

We investigate cross-protocol attacks on TLS in general and conducted a systematic case study on web servers, redirecting HTTPS requests from a victim's web browser to SMTP, IMAP, POP3, and FTP servers. We show that in realistic scenarios, the attacker can extract session cookies and other private user data or execute arbitrary JavaScript in the context of the vulnerable web server, therefore bypassing TLS and web application security.

We evaluated the real-world attack surface of web browsers and widely-deployed Email and FTP servers in lab experiments and with internet-wide scans. We find that 1.​4M web servers are generally vulnerable to cross-protocol attacks, i.e., TLS application data confusion is possible. Of these, 114k web servers can be attacked using an exploitable application server. As a countermeasure, we propose the use of the Application Layer Protocol Negotiation (ALPN) and Server Name Indication (SNI) extensions in TLS to prevent these and other cross-protocol attacks.

Although this vulnerability is very situational and can be challenging to exploit, there are some configurations that are exploitable even by a pure web attacker. Furthermore, we could only analyze a limited number of protocols, and other attack scenarios may exist. Thus, we advise that administrators review their deployments and that application developers (client and server) implement countermeasures proactively for all protocols.

More information on ALPACA can be found on the website https://alpaca-attack.com/.

Read more
  1. Hacking Tools Free Download
  2. Hacking Tools Github
  3. Pentest Tools Review
  4. Hack Tool Apk
  5. Hacking App
  6. Hacking Tools Windows 10
  7. Best Pentesting Tools 2018
  8. Hack Tool Apk
  9. Pentest Tools
  10. Easy Hack Tools
  11. Hacking Tools For Beginners
  12. Computer Hacker
  13. Hacking Tools Windows
  14. Tools 4 Hack
  15. Hacking Tools 2019
  16. Pentest Tools Free
  17. Hacker Tools For Windows
  18. Ethical Hacker Tools
  19. Hacker Search Tools
  20. Pentest Tools
  21. Pentest Tools Website Vulnerability
  22. Hacker Tools Linux
  23. Free Pentest Tools For Windows
  24. Pentest Recon Tools
  25. Hack Tools For Mac
  26. Install Pentest Tools Ubuntu
  27. Hacking Tools Software
  28. Hack Tools For Pc
  29. World No 1 Hacker Software
  30. Hacker Tools Software
  31. Hacker Tools 2020
  32. Hacking Tools 2019
  33. Hacker Tools Mac
  34. Hacking Tools Hardware
  35. Hacker Tools Mac
  36. Hacking Tools Windows
  37. Pentest Tools For Ubuntu
  38. Beginner Hacker Tools
  39. Hacking Tools Usb
  40. Hacking Tools For Windows Free Download
  41. Hack Tools For Games
  42. Hacking Tools Free Download
  43. New Hack Tools
  44. Hack Tools For Windows
  45. Hacker Tools Apk Download
  46. Underground Hacker Sites
  47. New Hack Tools
  48. Hacking Tools For Mac
  49. Hacker Tools For Windows
  50. Blackhat Hacker Tools
  51. Hacking Tools 2019
  52. Pentest Tools Github
  53. Hacker Tools Free Download
  54. Best Pentesting Tools 2018
  55. Hack Tools Download
  56. Hack Tools For Ubuntu
  57. Easy Hack Tools
  58. Hacking Tools For Mac
  59. Hacking Tools Github
  60. New Hacker Tools
  61. Pentest Tools Windows
  62. Hak5 Tools
  63. World No 1 Hacker Software
  64. Hacker Tools For Pc
  65. Hack Tools For Mac
  66. Hacking Tools For Beginners
  67. Pentest Tools For Ubuntu
  68. Install Pentest Tools Ubuntu
  69. Pentest Tools Find Subdomains
  70. Hack Tools Mac
  71. Hacker Security Tools
  72. Hack Tools Github
  73. Free Pentest Tools For Windows
  74. Hacking Tools Pc
  75. Pentest Tools Kali Linux
  76. Pentest Tools Website Vulnerability
  77. Hacking Tools Windows 10
  78. Hacking Tools For Mac
  79. World No 1 Hacker Software
  80. Top Pentest Tools
  81. Best Hacking Tools 2019
  82. Pentest Tools Framework
  83. Usb Pentest Tools
  84. Hacking Tools For Windows
  85. Hack Tool Apk
  86. Hacker Tools Linux
  87. Wifi Hacker Tools For Windows
  88. Hacker Search Tools
  89. Hacking Apps
  90. Hacking Tools And Software
  91. Hacking Tools 2019
  92. Pentest Tools Open Source
  93. Computer Hacker
  94. Best Pentesting Tools 2018
  95. Black Hat Hacker Tools
  96. Hack Tools Pc
  97. Growth Hacker Tools
  98. Hacker Tools Mac
  99. Hacking Tools Github
  100. Pentest Tools Framework
  101. Hacker Tools 2019
  102. Hacker Tools
  103. Hack Tools For Ubuntu
  104. Pentest Tools Url Fuzzer
  105. Hacker Tools For Pc
  106. Hacking Tools For Games
  107. Hacker Tools Windows
  108. Termux Hacking Tools 2019
  109. Hacker Tools For Mac
  110. Pentest Tools List
  111. Hacking Tools For Windows
  112. Pentest Tools Find Subdomains
  113. Best Pentesting Tools 2018
  114. Github Hacking Tools
  115. Hack Tools 2019
  116. New Hacker Tools
  117. Pentest Tools Alternative
  118. Hacking Tools Windows 10
  119. Usb Pentest Tools
  120. Hack Rom Tools
  121. Pentest Recon Tools
  122. Pentest Tools Open Source
  123. Pentest Tools For Mac
  124. Hacker Tools Apk
  125. Hacking Tools For Windows
  126. Hacker Tool Kit
  127. Hacks And Tools
  128. Pentest Tools Url Fuzzer
  129. Hacking Tools Github
  130. Hack Tools Mac
  131. Hack Tools Download
  132. Pentest Tools Open Source
  133. Hacker Tools For Windows
  134. Kik Hack Tools
  135. Tools 4 Hack
  136. Pentest Box Tools Download
  137. Underground Hacker Sites
  138. Pentest Tools Free
  139. Usb Pentest Tools
  140. Github Hacking Tools
  141. Pentest Tools For Mac
  142. Hacker Security Tools
  143. Hackers Toolbox
  144. Physical Pentest Tools
  145. Free Pentest Tools For Windows
  146. Top Pentest Tools
  147. Pentest Tools Free
  148. Tools Used For Hacking
  149. Hacking Tools For Windows
  150. Hacker Tools For Ios
  151. Pentest Automation Tools
  152. Hack Tools For Games
  153. Hack Tools For Ubuntu
  154. Hacking Tools Kit
  155. Pentest Tools Open Source
  156. Hacker Tools Software
  157. Pentest Tools Tcp Port Scanner
  158. Hack Tools
  159. Hack Tools Github
  160. Hacker Tools For Mac
  161. Hacking Tools Windows 10
  162. Pentest Tools Port Scanner
  163. Hacking Tools For Windows
  164. New Hacker Tools

Không có nhận xét nào:

Đăng nhận xét