Intercept a network connection for a particular user |
please flag with care:
| |
2007-12-19 | No history | | Add My version | |
(mindmap file created by ConceptDraw MINDMAP)
| | |
This is a mind map about Intercepting a network connection for a particular user. Internet Security. From http://www.ddj.com/ | |
| |
outline | |
Intercept a network connection for a particular user |
| 1.1 Break the public key encryption. |
| 1.1.1.1 Factor the modulus. |
| 1.1.1.2 Find a weakness in the implementation. |
| 1.1.1.3 Find a new attack on the cryptography system. |
| 1.1.2.1 Calculate the discrete log. |
| 1.1.2.2 Find a weakness in the implementation. |
| 1.1.2.3 Find a new attack on the cryptography system. |
| 1.1.2.4 Try to attack the key generation method. |
| 1.1.2.4.1 Attack the random number generator. |
| 1.1.2.4.2 Trick the user into installing known keys. |
| 1.2 Break the symmetric key encryption. |
| 1.3 Break the use of cryptography in the protocol. |
| 2.1 User uses public key authentication? |
| 2.1.1 Obtain private key of user. |
| 2.1.1.1 Obtain encrypted private key (AND). |
| 2.1.1.1.1 Break into the machine and read it off disk. |
| 2.1.1.1.2 Get physical access to the computer. |
| 2.1.1.1.3 Compel user to give it to you (social engineering). |
| 2.1.1.2 Obtain pass phrase. |
| 2.1.1.2.1 Break into machine and install a keyboard driver. |
| 2.1.1.2.2 Install a hardware keystroke recorder. |
| 2.1.1.2.3 Try passwords using a crack-like program. |
| 2.1.1.2.4 Read over someone's shoulder when he or she is typing. |
| 2.1.1.2.5 Capture the pass phrase with a camera. |
| 2.1.1.2.6 Capture less secure passwords from the same user and try them. |
| 2.1.1.2.7 Get the pass phrase from the user (for example, blackmail). |
| 2.1.1.3 Read the entire key when unencrypted. |
| 2.1.1.3.1 Break into the machine and read it out of memory (especially on Windows 9X boxes). |
| 2.1.1.3.2 Launch a "tempest" attack (capture emissions from the computer to spy on it). |
| 3.1 [details elided … see 2.1.1.2] |
| 4 Attempt a man-in-the-middle attack. |
| 4.1 Does the user blindly accept changes in the host key? |
| 4.1.1 Use sniff to automate the attack, then intercept all future connections with the same (fake) host key. |
| 4.2 Does the user accept the host key the first time he or she connects? |
| 4.2.1 Use, and be sure to intercept, all future connections with the same key! |
| 5.1 Compel administrator to run modified daemon. |
| 5.2 Break in and install modified code. |
| 6 Find a software vulnerability in the client or daemon, such as a buffer overflow. |
| 7 Modify the software distribution. |
| 7.1 Bribe developers to insert a backdoor. |
| 7.2 Break into the download sites and replace the software with a Trojan horse version. |
| |