Page 40 - index
P. 40
The man-in-the-middle attack is used when combined with the SSL strip infusion on basic
HTTPS (Hypertext Transfer Protocol Secure) websites. HTTPS is a internet protocol we use
when logging on to a secure website. Whenever you see a lock in your website URL or that the
URL starts with “https:” you can be assured that your information that you send to your bank,
Facebook page, or any other secure website is encrypted. However, what the SSL strip does is
it turns a secure website HTTPS to an HTTP thus sending your information in clear text. There
are exceptions for this when the SSL is built into the code of a website, however for this
company attack I was not too worried about that. The pineapple router could also let me poison
websites that they frequently visited. How it poisons is it sets up a page to look exactly what you
are looking for but it sends the credentials back to me, rather than the real page.
The next thing I grabbed was the operating system Kali linux. Kali linux is an operating system
most penetration testers use as it’s highly versatile with many of a penetration attacker’s tools,
as well has preinstalled packages to attack any system. The two tools I will be talking about,
installed on the Kali Linux operating system, are Armitage and the social engineering toolkit.
Armitage is a tool developed by Raphael Mudge, to help penetration testers do scans and get
exploit recommendations.
The social engineering toolkit is toolkit that sets up attacks for you through an easy user-friendly
interface. Although there are many uses for the social engineering toolkit, such as poisoning a
USB to install malicious code on your computer, I used its ability to make a phishing email that
would capture the credentials of a user.
Next was the USB rubber ducky. This is a programmable usb that when plugged into a
computer, it auto runs its program to harvest credentials of clients and emails them back to the
attacker. The program I was going to use was called WebBrowserPassView. This is a program
made by Nirosoft to grab all the websites you have visited with cookies. Which means, it
captures your username and passwords if you’ve ever told a website to remember your
credentials.
The last thing I needed was a new identity and a five dollar smile. The problem with my
pineapple router, (although I can log into it remotely), was it had to be in the vicinity of the
companies wifi. So I came up with an idea on how to sneak it in. I would say that I was a
representative from the recycling group at the local college. I figured I could drop bins off with
the router on the bottom of the bin with an external battery, that way when or if I ever made a
change on the bins I could easily retrieve it. Oh who doesn’t trust a nice smile?
I went to one of the owners offices and told them and that I was from the local college and for
our recycling club we were going to different local business and were placing recycling bins to
help the environment as a service project. I told them that I had spoken with the owner of the
company who said it was ok and that I had a short presentation that would be followed with
some pizza.
They seemed reluctant about the presentation, but after telling them I had spoken with the
owner and he okay’d it, they accepted. I showed up the next day, a half hour earlier, then
40 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide