![]() |
||||||||||
|
|
||||||||||
Email
Wiretap Exploit Name: Email Wiretap Variants: None known Operating System: Relevant to email readers on Windows 9x, NT, 2000, Mac Protocols/services: utilizes the http application protocol and the client-side active scripting interpreter. Brief description: Due to the insecure, default settings of Outlook and Outlook Express, a malicious user can craft an html email, which will enable the malicious user to read forwarded instances of the email. In addition, the malicious user can use the email to track and compile a database of email addresses. Credits: Discovered October 5, 1998 by Carl Voth Protocol description: How does the exploited protocol work? When a user retrieves a web page via their browser (Netscape, Internet Explorer, lynx, etc.), they typically type a web address into an address bar. An example would be www.yahoo.com. The browser makes the assumption that the protocol is HTTP. The browser then sends a request to the appropriate DNS server, asking for the IP address of the website. The DNS server should return an IP address. Once the IP address of the Internet server is known, a TCP connection is established with the Internet server. Next, the browser sends a request to the Internet server over the established TCP connection. An example would be "GET / HTTP/1.0" followed by two carriage returns (CRLF).
The Internet server returns a document to the browser. This document can contain scripting code, links to other servers, links to images, and much more. The browser now retrieves each separate image, script, link, etc. The user sees the page displayed within their browser window. Although the user only typed one web address into the address bar, the browser may have made many connections to many different servers across the Internet in order to retrieve all of the information displayed. Let's look at a more concrete example (NOTE: the domain names are fake). Joe Smith is running Windows 2000 with Internet Explorer 5. Joe double-clicks his desktop "Internet Explorer" icon and his browser launches. Joe highlights the contents of his address bar and types in "www.goople3494.com". www.goople3494.com is resolved to IP address 192.168.1.1. A connection to 192.168.1.1 is established and Joe's browser sends the following request:
Joe's browser now resolves www.someotherserver3494 to IP address 192.168.1.2. A session, like the one above, occurs between www.someotherserver3494.com and Joe's browser. The image is downloaded and displayed in Joe's browser window. As I mentioned above, the HTML downloaded from an Internet server, or read in an html email reader, can include scripts. Scripts are not displayed in the browser or html email reader. Instead, when the browser or email reader encounters the <script> directive, it reads all code up to the </script> directive. All code is interpreted and run on the client computer. In this example, JavaScript is used. JavaScript is a powerful, interpreted language. A simple example of JavaScript embedded within an html document is:
DESCRIPTION OF VARIANTS: None known. How the exploit works: There are 2 parts to this exploit. Part one is the client email reader, which must support DHTML with active scripting enabled. The client must have an active connection to the Internet. Part two is an Internet server running a cgi script to receive and save the forwarded messages. The malicious user now creates an email with the following html:
Before sending the email, the malicious user must:
The malicious user creates a script like:
Now the user sends the email to the intended victim. The victim receives the email and forwards the email, with comments, to his/her husband/wife, partner, boss, etc. When the recipient highlights the email in their email reader, the script will activate and forward the "forwarded" message to www.evilserver.com. The attacker now has the victim's reaction to his/her email. If the email is forwarded again, www.evilserver.com will receive and save any new comments added to the email as well as the list of email addresses that the victim forwarded to. This could go on endlessly. Each time the email is forwarded, the evil Internet server receives more comments and email addresses. Diagram: DEFER How to Use the Exploit: Now, we can get to a step-by-step working example. Please note that this should only be done in a lab environment for educational purposes. It is unethical (not to mention illegal in most places) to run this exploit on unsuspecting clients. Prerequisites (i.e. what we'll need for this experiment) Access to a Linux Apache web server. Access to a windows machine with the Outlook email client. Outlook client should already be configured to send and receive email with a valid account. We need to create an html document. The simplest way to do this is to open up an editor. On your Windows machine:
On the Windows machine
Signature of the attack: This attack is very hard to pin a signature on. The outbound HTTP GET request is valid and common traffic on most networks. The only part that looks a little out of place is the %0D%0A (CRLF) interspersed within the email and the fact that someuser@yourcompany.com is also included in the URL. Unfortunately, we can't match on the "%0D%0A" since the CRLF is prevalent in all HTTP requests. We can however, create a signature to look for outgoing "user@yourcompany.com" embedded in HTTP GET requests (I guarantee this will generate false positives!). (SNORT RULE alert tcp any -> any 80 (msg:"Outgoing web request with email addresses in GET request"; content: "@yourcompany.com"; nocase;) How to protect against this attack: Disable active scripting within your email reader.
Source Code/Pseudo code The code samples above work just fine. However, for a more detailed scripts see the URL below. http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exploit-release.html Links to additional information: http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exploit-release.html http://www.cen.uiuc.edu/~ejk/browser-security.html#Voth http://www.idg.net/crd_privacy_412136_103.html http://www.cli.org/emailpolicy/ECPA.html http://www.infoworld.com/articles/hn/xml/01/02/05/010205hnwiretap.xml |
||||||||||
|
to top of page | to Threats & Vulnerabilities | to Reading Room Home
|
||||||||||
![]() |
||||||||||