Reply to topic  [ 5 posts ] 
Attack hijacks data using newer Windows features 
Author Message
I haven't seen my friends in so long
User avatar

Joined: Thu Jun 18, 2009 5:10 pm
Posts: 5837
Reply with quote
Quote:
Mac OS X probably vulnerable too

Security researchers have outlined a way to hijack huge amounts of confidential network traffic by exploiting default behavior in Microsoft's Windows operating system.

The MITM, or man-in-the-middle, attacks described on Monday take advantage of features added to recent versions of Windows that make it easy for computers to connect to networks using the next generation IPv6 protocol. The attack will also work against Apple's OS X for Macs, although the proof-of-concept has not been tested on that platform, said Jack Koziol, a program manager at InfoSec Institute, an information security services company.

The attack exploits an industry standard known as SLAAC, or Stateless Address Auto Configuration for allowing clients and hosts to find each other on IPv6 networks. When the next-generation addressing scheme is turned on, as it is by default in OS X, Windows Vista, Windows 7 and Server 2008, SLAAC can be used to create an unauthorized IPv6 network that reroutes data through hardware controlled by the attackers.

...By default, Linux, FreeBSD and other operating systems aren't vulnerable, Koziol said....

http://www.theregister.co.uk/2011/04/04 ... t_windows/

_________________
Jim

Image


Tue Apr 05, 2011 3:54 pm
Profile
What's a life?
User avatar

Joined: Thu Apr 23, 2009 7:26 pm
Posts: 17040
Reply with quote
simple fix : Switch off IPV6 if you're not actually using it. However the actual chance for this to be an issue to people outside the corporate world is quite small, since most home routing equipment (i.e. cable/ADSL modems) doesn't route IPv6. Therefore to be vulnerable to this, you already have to have a compromised machine inside your home LAN; either a piece of hardware or a PC running a 'nasty' IPV6 router. In short, if you're vulnerable to this at home you're probably already stuffed anyway.

Jon


Tue Apr 05, 2011 4:19 pm
Profile
I haven't seen my friends in so long
User avatar

Joined: Thu Apr 23, 2009 6:58 pm
Posts: 8767
Location: behind the sofa
Reply with quote
jonbwfc wrote:
Therefore to be vulnerable to this, you already have to have a compromised machine inside your home LAN; either a piece of hardware or a PC running a 'nasty' IPV6 router. In short, if you're vulnerable to this at home you're probably already stuffed anyway.

Quite, as Microsoft said in their reply:

Quote:
The attack method described would require that a would-be attacker have physical access to the targeted network in order to install a tainted router - a situation that does not provide a security boundary.


If a bad guy is inside your house plugging stuff into your network, then you might say the security problem lays with your house rather than your computer.

You could actually do something not entirely dissimilar with IPv4 by introducing a bogus DHCP server to a network. Most versions of Windows Server are set to back-off if they detect another DHCP server on the network, so you can issue your own IP as the default gateway and all WAN traffic from computers that pick up your address will go through you.

_________________
jonbwfc's law: "In any forum thread someone will, no matter what the subject, mention Firefly."

When you're feeling too silly for x404, youRwired.net


Tue Apr 05, 2011 6:14 pm
Profile WWW
What's a life?
User avatar

Joined: Thu Apr 23, 2009 7:26 pm
Posts: 17040
Reply with quote
JJW009 wrote:
If a bad guy is inside your house plugging stuff into your network, then you might say the security problem lays with your house rather than your computer.

Not.. entirely true. It's very possible for a PC that has previously been compromised to act as the 'evil router'. There is already malware that will run a DHCP server on the machine it takes over, completely independently and invisibly to the user. They have to be able to get onto your network, but not necessarily physically access the wires. Physical security will stop lots of things but this can be done entirely remotely, IMO.

However, the point still holds. If you're sat at home - maybe you have a couple of PC's and a games console or media server on your home network - and they've got hold of one of the machines to the point where they can install and run software on it, you're already buggered. if they can install an IPv6 router on the PC, they can instal pretty much anything they like - packet sniffers, key loggers etc.

It's generally held to be a good idea to switch off any service or function on your PC you're not using anyway. This is just another reinforcement of that.

Jon


Tue Apr 05, 2011 8:30 pm
Profile
What's a life?
User avatar

Joined: Thu Apr 23, 2009 8:25 pm
Posts: 10691
Location: Bramsche
Reply with quote
rustybucket wrote:
Quote:
Mac OS X probably vulnerable too

Security researchers have outlined a way to hijack huge amounts of confidential network traffic by exploiting default behavior in Microsoft's Windows operating system.

The MITM, or man-in-the-middle, attacks described on Monday take advantage of features added to recent versions of Windows that make it easy for computers to connect to networks using the next generation IPv6 protocol. The attack will also work against Apple's OS X for Macs, although the proof-of-concept has not been tested on that platform, said Jack Koziol, a program manager at InfoSec Institute, an information security services company.

The attack exploits an industry standard known as SLAAC, or Stateless Address Auto Configuration for allowing clients and hosts to find each other on IPv6 networks. When the next-generation addressing scheme is turned on, as it is by default in OS X, Windows Vista, Windows 7 and Server 2008, SLAAC can be used to create an unauthorized IPv6 network that reroutes data through hardware controlled by the attackers.

...By default, Linux, FreeBSD and other operating systems aren't vulnerable, Koziol said....

http://www.theregister.co.uk/2011/04/04 ... t_windows/

It doesn't sound any different to DHCP under IPv4. It does the same thing, although it is usally quick to see, because half the network will configure over one DHCP server and the other half over the 2nd DHCP server and they won't be able to see each other...

I've worked on several sites, where there have been problems with machines not seeing all network resources or not getting onto the internet. The problem was often intermittent and the cause was usually somebody putting in their own/department wireless router, without clearing it with the IT department, and leaving the default configuration of it being a DHCP server.

If you know what you are doing, you could easily set up a DHCP server on the local network and get all the traffic coming over your machine. That affects ALL operating systems, where dynamic addresses are assigned at boot time.

_________________
"Do you know what this is? Hmm? No, I can see you do not. You have that vacant look in your eyes, which says hold my head to your ear, you will hear the sea!" - Londo Molari

Executive Producer No Agenda Show 246


Wed Apr 06, 2011 4:18 am
Profile ICQ
Display posts from previous:  Sort by  
Reply to topic   [ 5 posts ] 

Who is online

Users browsing this forum: No registered users and 19 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group
Designed by ST Software.