Dark Mode
Capec-217 Detail
Exploiting Incorrectly Configured SSL/TLS
Standard Communications Likelihood: Low
Parents: 216
Threats: T272 T276 T296 T395
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-217 | capec | https://capec.mitre.org/data/definitions/217.html | |
| CWE-201 | cwe | http://cwe.mitre.org/data/definitions/201.html |
Explore
-
Determine SSL/TLS Configuration: Determine the SSL/TLS configuration of either the server or client being targeted, preferably both. This is not a hard requirement, as the adversary can simply assume commonly exploitable configuration settings and indiscriminately attempt them.
| Techniques |
|---|
| If the target is a webpage, some of the SSL/TLS configuration can be viewed through the browser's security information, such as the key sizes and cipher being used. |
Experiment
-
Intercept Communication: Provide controlled access to the server by the client, by either providing a link for the client to click on, or by positioning one's self at a place on the network to intercept and control the flow of data between client and server, e.g. AiTM (adversary in the middle - CAPEC-94).
| Techniques |
|---|
| Create a malicious webpage that looks identical to the target webpage, but routes client traffic to the server such that the adversary can observe the traffic and perform an adverary in the middle attack. |
| If the adversary has access to the network that either the client or server is on, the can attempt to use a packet sniffer to perform an adversary in the middle attack. |
| Install a packet sniffer through malware directly to a client device that can intercept SSL/TLS traffic and perform an adversary in the middle attack. |
Exploit
-
Capture or Manipulate Sensitive Data: Once the adversary has the ability to intercept the secure communication, they exploit the incorrectly configured SSL to view the encrypted communication. The adversary can choose to just record the secure communication or manipulate the data to achieve a desired effect.
| Techniques |
|---|
| Use known exploits for old SSL and TLS versions. |
| Use known exploits for weak ciphers such as DES and RC4. |
- Access to the client/server stream.
- The adversary needs the ability to sniff traffic, and optionally be able to route said traffic to a system where the sniffing of traffic can take place, and act upon the recovered traffic in real time.
| High |
|---|
| The adversary needs real-time access to network traffic in such a manner that the adversary can grab needed information from the SSL stream, possibly influence the decided-upon encryption method and options, and perform automated analysis to decipher encrypted material recovered. Tools exist to automate part of the tasks, but to successfully use these tools in an attack scenario requires detailed understanding of the underlying principles. |
| Authorization | Access Control | Confidentiality |
|---|---|---|
| Gain Privileges | Gain Privileges | Read Data |
| Gain Privileges |
- Using MITM techniques, an adversary launches a blockwise chosen-boundary attack to obtain plaintext HTTP headers by taking advantage of an SSL session using an encryption protocol in CBC mode with chained initialization vectors (IV). This allows the adversary to recover session IDs, authentication cookies, and possibly other valuable data that can be used for further exploitation. Additionally this could allow for the insertion of data into the stream, allowing for additional attacks (CSRF, SQL inject, etc) to occur.