In cooperation with the university Paderborn and Münster University of Applied Sciences, we discovered a new flaw in the specification of TLS. The vulnerability is called ALPACA and exploits a weakness in the authentication of TLS for cross-protocol attacks. The attack allows an attacker to steal cookies or perform cross-site-scripting (XSS) if the specific conditions for the attack are met.
TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
We investigate cross-protocol attacks on TLS in general and conducted a systematic case study on web servers, redirecting HTTPS requests from a victim's web browser to SMTP, IMAP, POP3, and FTP servers. We show that in realistic scenarios, the attacker can extract session cookies and other private user data or execute arbitrary JavaScript in the context of the vulnerable web server, therefore bypassing TLS and web application security.
We evaluated the real-world attack surface of web browsers and widely-deployed Email and FTP servers in lab experiments and with internet-wide scans. We find that 1.4M web servers are generally vulnerable to cross-protocol attacks, i.e., TLS application data confusion is possible. Of these, 114k web servers can be attacked using an exploitable application server. As a countermeasure, we propose the use of the Application Layer Protocol Negotiation (ALPN) and Server Name Indication (SNI) extensions in TLS to prevent these and other cross-protocol attacks.
Although this vulnerability is very situational and can be challenging to exploit, there are some configurations that are exploitable even by a pure web attacker. Furthermore, we could only analyze a limited number of protocols, and other attack scenarios may exist. Thus, we advise that administrators review their deployments and that application developers (client and server) implement countermeasures proactively for all protocols.
More information on ALPACA can be found on the website https://alpaca-attack.com/.
Continue reading- Tools Used For Hacking
- New Hack Tools
- Pentest Tools Open Source
- Hack Tools Online
- Hack Tools Download
- Hacker Tools Mac
- Hacking Tools 2020
- Hacking Tools
- Pentest Box Tools Download
- Pentest Tools Url Fuzzer
- Tools Used For Hacking
- New Hack Tools
- Pentest Tools Linux
- Nsa Hack Tools
- Pentest Tools Alternative
- Nsa Hacker Tools
- Hacker Tools
- Hacking Apps
- Hacking Tools Hardware
- Hacker Tools Hardware
- Hacking Tools Mac
- Pentest Tools Nmap
- Hack Tool Apk
- Pentest Tools Download
- What Are Hacking Tools
- Nsa Hack Tools Download
- Pentest Tools Open Source
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Nsa Hack Tools
- Pentest Tools Nmap
- Hacking Tools For Windows Free Download
- Ethical Hacker Tools
- Hack Tools Online
- Hacker Tools Free
- Hack Rom Tools
- Hacking App
- Hacking Tools For Pc
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Apk
- Hack Tools
- Hackers Toolbox
- Hacking Apps
- Hacking Tools For Windows 7
- Pentest Automation Tools
- Hacker Tools 2019
- Easy Hack Tools
- Hacker Tools For Ios
- Hacker Tool Kit
- Hack Tools 2019
- Bluetooth Hacking Tools Kali
- Hacker
- Hacking Tools For Windows Free Download
- Hacking Tools Kit
- Pentest Tools Free
- Pentest Box Tools Download
- How To Install Pentest Tools In Ubuntu
- Hack Website Online Tool
- Game Hacking
- Hackrf Tools
- Pentest Tools Online
- Hack Website Online Tool
- Pentest Tools Alternative
- Hacking Tools For Kali Linux
- Install Pentest Tools Ubuntu
- Pentest Box Tools Download
- Hacks And Tools
- How To Make Hacking Tools
- Hacker Tools For Windows
- Hacker Tools For Mac
- Pentest Tools For Ubuntu
- Hacking Tools For Pc
- Pentest Tools Website Vulnerability
- Bluetooth Hacking Tools Kali
- Hack Tools Download
- Pentest Tools Find Subdomains
- Hacking Tools 2019
- Hacker Tools 2019
- Hacker Tools Online
- Hacker Tools For Mac
- What Is Hacking Tools
- Game Hacking
- Hack Tools For Mac
- Usb Pentest Tools
- Nsa Hack Tools
- What Are Hacking Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Android
- Pentest Reporting Tools
- Hacker
- Pentest Tools Alternative
- Hack Tools Github
- Hacking Tools Windows 10
- Usb Pentest Tools
- Pentest Tools Nmap
- Pentest Tools Bluekeep
- Hacker Tools Online
- Pentest Tools
- Hacking Tools For Pc
- Pentest Box Tools Download
- Hacker Tool Kit
- Underground Hacker Sites
- Hacker Search Tools
- Pentest Tools Alternative
- Android Hack Tools Github
- Pentest Tools Free
- Hacker Tools Windows
- Best Pentesting Tools 2018
- How To Hack
- Hacking Tools For Pc
- Hacking Tools 2020
- Hacking Tools Usb
- Hacker Tools Apk
- Hacking Tools Usb
- Hacker Tools Windows
- Hacker Tools 2020
- Hack Website Online Tool
- Hacker Security Tools
- Hacking Tools Download
- Easy Hack Tools
- Hacking Tools
- Hacker Tools Apk
- Hacker Tools For Mac
- Hacking Tools Hardware
- Wifi Hacker Tools For Windows
- Pentest Tools Alternative
- Hack Website Online Tool
- Pentest Recon Tools
- Game Hacking
- Pentest Tools Nmap
- Hacker Tools Hardware
- Hacking Tools Github