Skype Dangerous Advertising

2015.05.04
Credit: stackoff
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

April 13 guys from the SPEAR wrote a post about the vulnerability in all versions of Windows. Strange that it was done until now. The vulnerability was published many years ago, when Internet Explorer was much more common than Netscape Navigator, and chromium in those days was not at all. Briefly about the vulnerability When you call to the SMB resource (for file: //) components IE sent in the request for authorization data. Sent as a local login on the system, and NTLM hash of the user. Thus it is possible to obtain data for authorization on the victim's computer. Vulnerable not only IE, but the software and that uses the components to communicate with the world, or the local network. The basis of the attack is to intercept HTTP requests from the user and redirect it to the attacker resource on which the software is deployed, the client requesting authorization data. This is done very simply, for example, a response to the HTTP request through the 302 redirect code and redirect to the appropriate protocol, in this case file. To carry out the attack, use the following software: SMBTrap - to intercept the authorization data Ettercap - for ARP and DNS spufiga Nginx - to redirect the circuit file Video https://www.youtube.com/watch?v=YlFmdCemANQ

References:

https://www.youtube.com/watch?v=YlFmdCemANQ
https://stackoff.ru/pochemu-reklama-v-skajpe-ne-tolko-urodliva-no-eshhe-i-opasna/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top