Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Time for an Upgrade- 456

Grimm - AdamPosted 4 Years Ago
  • Keeping track of the time is a complicated task. This is why Domain time II was created, which is the target of this blog post.
  • Man-in-the-Middle (MitM) is an attacker where can attacker can inspect and control the communication flow. In a variant of the attack, known as Man-on-the-Side (MotS), an attacker can inspect traffic (not control) and can respond to the traffic they can see. This is a much easier position to get than MitM.
  • The Desktop application has an automatic upgrade feature. To know where it needs to update or not, it reaches out with a UDP request over plaintext. Then, if the response to this contains a URL then a diagram will open instructing a user to download the new software.
  • The issue is that UDP is stateless. So, if an attacker can see this request happening, they can respond with their own message. Within this message, they can have their own URL that will then be used for an upgrade.
  • The normal use-case for this application is to be running on a Domain Controller. With a privileged network position, this could be a devastating attack.
  • I am assuming that the product is not signed? Because, if the product was not signed, then the fake application would not work on the automatic installation. In the demonstration, the user must run an executable.
  • Overall, the MotS is not something that I have ever considered before! Even in 2021, we need to remember that encryption is mandatory in order to prevent these types of attacks.