Gidley's Gossipings

A blog about not much really

N26

2017-01-04 Tech
There is a really good talk about some vulnerabilities found in the N26 banking app presented at the CCC congress this year. <amp-iframe width=“1024” height=“360” sandbox=“allow-scripts allow-popups” layout=“responsive” frameborder=“0"src=“https://media.ccc.de/v/33c3-7969-shut_up_and_take_my_money/oembed" allowfullscreen> The talk is worth a watch but it does highlight some key points No Certificate Pinning was being used that made it easy for the research to MITM the app that’s not to say Cert Pinning fixes all issues but doing it makes things a lot harder for attackers. Continue reading

Kaspersky

2017-01-04 Tech
Ouch - Kaspersky have been enabling MITM attacks on their customer base. The Register citig a Chrome bug report explains how you can use this to trick consumers in thinking a site is valid/safe when it is not. This underlines the ease of MITM SSL/TLS - see my previous article for all the different ways this can be done!

Human Momentum

2016-11-28 Tech
I’ve been travelling quite a bit recently for work and have been reminded (again) how ‘human factors’ can defeat any attempt to improve security. A good example of this is chip and pin/contactless. Chip and Pin is common and popular in Europe and as a result in Europe I never ‘give’ my card to members of staff for them to process it. This reduces the risk of fraud substantially as staff cannot easily clone/copy cards when they’ve never handled them. Continue reading

Man in the middle is easier than you think

2016-11-18 Tech
I’m often heard saying it’s quite easy to MITM HTTPS (also called SSL/TLS) and decided that maybe I should list all the methods I know of (there are quite a few). The attacker has many options to try and get in the middle between the user and web server/API Pure Technical Approaches Zero Day Vulnerabilities in browsers TLS/SSL Breaks Incorrectly Issued Trusted Certificate Aquire vendor issued ’trusted’ certificate Social Engineering Approaches Convince user to install MITM certificate Convince user to install software Malicious Browser Extensions Conclusion Pure Technical Approaches The pure technical approaches rely on attacks that don’t require users to make any mistakes and anyone can be vulnerable. Continue reading

mitm key

2016-11-16 Tech
To continue my MITM attacks theme - someone has just release a nice USB key that ransacks your PC - Ars Technica has a good write up. This kind of thing is very dangerous as it’s really easy to get people to put USB keys into computers! I’m currently writing a longer article on the (many) ways to MITM TLS to help explain how easy it is!

malware and https

2016-11-11 Tech
I’m often heard worrying about the state of HTTPS and the ease to get users to do things that make it basically not function - but I’ll admit evidence of real world attacks is thin on the ground. There is a systematic reason for the lack of information - if a hacker uses a Man-In-The-Middle (MITM) technique to hack HTTPS there is very little evidence left and all thart will happen is the stolen data will turn up in a list at some point in the future. Continue reading

Booth eye tracking

2016-10-26 Tech
Recently I was at a Trade Show (Money 2020 in Las Vegas) and was wondering how effective the booth designs were at getting people’s attention. There seem to be a number of apporaches people try Big Pictures to grab attention Videos on loop explaining stuff ‘Gimmicks’ on the stand Live Talks Text explaining products Slogans explaining mission What’s not clear to me is which of these actually work. Annecdotially you can watch people go buy and see what they look at, and then observe who engages. Continue reading
Older posts Newer posts