Mind Mind Mind Point to Share Knowlege  
 
   
  Add New Map Add New Map About us About us Help Help Contact us Contact us  

Intercept a network connection for a particular user

please flag with care:
best of
error
spam
 
2007-12-19No history Add My version 
 (mindmap file created by  ConceptDraw MINDMAP)

  
This is a mind map about Intercepting a network connection for a particular user. Internet Security. From http://www.ddj.com/ 
 
outline 
Intercept a network connection for a particular user
  1 Break the encryption.
  1.1 Break the public key encryption.
  1.1.1 Using RSA?
  1.1.1.1 Factor the modulus.
  1.1.1.2 Find a weakness in the implementation.
  1.1.1.3 Find a new attack on the cryptography system.
  1.1.2 Using El Gamal?
  1.1.2.1 Calculate the discrete log.
  1.1.2.2 Find a weakness in the implementation.
  1.1.2.3 Find a new attack on the cryptography system.
  1.1.2.4 Try to attack the key generation method.
  1.1.2.4.1 Attack the random number generator.
  1.1.2.4.2 Trick the user into installing known keys.
  1.2 Break the symmetric key encryption.
  1.2.1 [details elided]
  1.3 Break the use of cryptography in the protocol.
  1.3.1 [details elided]
  2 Obtain a key.
  2.1 User uses public key authentication?
  2.1.1 Obtain private key of user.
  2.1.1.1 Obtain encrypted private key (AND).
  2.1.1.1.1 Break into the machine and read it off disk.
  2.1.1.1.2 Get physical access to the computer.
  2.1.1.1.3 Compel user to give it to you (social engineering).
  2.1.1.2 Obtain pass phrase.
  2.1.1.2.1 Break into machine and install a keyboard driver.
  2.1.1.2.2 Install a hardware keystroke recorder.
  2.1.1.2.3 Try passwords using a crack-like program.
  2.1.1.2.4 Read over someone's shoulder when he or she is typing.
  2.1.1.2.5 Capture the pass phrase with a camera.
  2.1.1.2.6 Capture less secure passwords from the same user and try them.
  2.1.1.2.7 Get the pass phrase from the user (for example, blackmail).
  2.1.1.3 Read the entire key when unencrypted.
  2.1.1.3.1 Break into the machine and read it out of memory (especially on Windows 9X boxes).
  2.1.1.3.2 Launch a "tempest" attack (capture emissions from the computer to spy on it).
  2.2 Obtain a server key.
  2.2.1 [details elided]
  3 Obtain a password.
  3.1 [details elided … see 2.1.1.2]
  4 Attempt a man-in-the-middle attack.
  4.1 Does the user blindly accept changes in the host key?
  4.1.1 Use sniff to automate the attack, then intercept all future connections with the same (fake) host key.
  4.2 Does the user accept the host key the first time he or she connects?
  4.2.1 Use, and be sure to intercept, all future connections with the same key!
  5 Circumvent software.
  5.1 Compel administrator to run modified daemon.
  5.2 Break in and install modified code.
  6 Find a software vulnerability in the client or daemon, such as a buffer overflow.
  7 Modify the software distribution.
  7.1 Bribe developers to insert a backdoor.
  7.2 Break into the download sites and replace the software with a Trojan horse version.