รายละเอียดคร่าวๆ</span> :P
Introduction
SSL (Secure Socket Layer) is the industry standard for delivering secure content to a web user with
little knowledge required for setup on the user side. This paper will attack the SSL protocol and
examine the effects of poor security education. We will be using a Man in the Middle attack to send
the web user a spoofed certificate when he attempts to connect to a website via HTTPS.
Purpose
The attack that will be demonstrated in this paper is to be used for an educational purpose only. This
paper should be used to promote security awareness and emphasize the concern that should be placed
upon secure infrastructure. The authors of this guide will not be held responsible for any misuse of the
information within.
Scope
This document is broken down into eight different categories, each explaining a new phase of the
process. The eight sections are organized in this manner to add the option of following this guide as a
checklist, for ease of use. The attack will begin with chapter three of this guide. If you already have a
copy of iWhax, Whoppix, or Auditor you may wish to skip to that section.
Chapter 2: Downloading iWhax or Whoppix
Provides links to the software and discusses its origin.
Chapter 3: Fragrouter
Explains the fragrouter program and why IP forwarding is necessary to this attack.
Chapter 4: Arpspoof
Describes the process of an ARP cache poisoning. This is the heart of a Man in the Middle attack;
we will discuss the theory behind the attack, as well as the process required to perform this
operation.
Chapter 5: Dnsspoof
The software provides us with a simple way to complete the ARP cache poisoning by forging
replies to arbitrary DNS addresses.
Chapter 6: Webmitm
This chapter will discuss a very important step, the forging of a certificate. Using the webmitm
tool we can create a false certificate and transparently relay and save HTTP / HTTPS traffic
redirected by dnsspoof. It will also present the user with the false certificate upon request to a
secure site.
Chapter 7: Sniffing Network Traffic with Ethereal
We have chosen to use Ethereal as our network sniffer because of it’s intuitive interface, easily
filtered traffic, and excellent dump files.
Chapter 8: Testing a Connection on Your Home Network
Using a second computer on your network (the target for attack in this demonstration) it is now
time to attempt to connect to a secure site.
<span style="color:#FF0000">Chapter 9:
Decrypting the SSL data with SSLdump
We will use the ssldump tool to decrypt the SSLv3/TLS traffic and display the data in plaintext.


เชิญโหลดไปดูได้ตามสบาย ทุกขั้นตอนมีรูปภาพประกอบ ง่ายยังกะปอกกล้วยเข้า...?
**Hidden Content: To see this hidden content your post count must be 5 or greater.**