"HTTPS REQUEST WITHOUT SSL CERTIFICATE HOSTNAME VERIFICATION " not detecting any vulnerability

113 views
Skip to first unread message

swaraj...@gmail.com

unread,
Feb 15, 2017, 4:06:00 AM2/15/17
to nogotofail
Hi Alex,
Thank you for your support,

I am trying to detect the  vulnerable traffic with the help of nogotofail MiTM tester app,
I have install and configured the following both apps,

1) nogotofail
    Configuration   nogotofail --> settings --> Attacks
       Probability of attack -- 100% 
       Custom list of attacks -- Checked 
  
 
 2) nogotofail MiTM tester 



In the following table,  Vertical header are the attacks performed (nogotofail --> settings --> Attacks) and Horizontal left most column is the nogotofail MiTM tester --> TLS/SSL --> options 
The table contains the log result for the MiTM server 

BENCHMARK TEST RESULTS 

 NO ATTACKTLS MiTM using an anonymous serverClient Heartbleed Reject TLS/SSL handshakeReject TLS handshake Early CCSTLS cert for wrong hostname Self-signed TLS cert TLS MiTM by replacing SSL servers keysuperfishmitm
NORMAL TLS CONNECTION OKSSL exception: [('SSL routines', 'SSL3_GET_CLIENT_HELLO', 'no shared cipher')]Handshake fail Handshake fail Handshake fail Client not vulnerable SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]Client not vulnerable SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]
HTTPS REQUEST WITHOUT SSL CERTIFICATE CHAIN-OF-TRUST CHECKOKSSL exception: [('SSL routines', 'SSL3_GET_CLIENT_HELLO', 'no shared cipher')]Handshake fail Handshake fail Handshake fail Client not vulnerable Handshake fail NGClient not vulnerable NG
HTTPS REQUEST WITHOUT SSL CERTIFICATE HOSTNAME VERIFICATION OKSSL exception: [('SSL routines', 'SSL3_GET_CLIENT_HELLO', 'no shared cipher')]Handshake fail Handshake fail Handshake fail Client not vulnerable SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]Client not vulnerable SSL exception: [('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert certificate unknown')]
HTTPS REQUEST WITHOUT SERVER AUTHENTICATIONOKSSL exception: [('SSL routines', 'SSL3_GET_CLIENT_HELLO', 'no shared cipher')]Handshake fail Handshake fail Handshake fail Client not vulnerable NGNGClient not vulnerable NG
***

OK = No vulnerability detects, and HTTP request succeeded.

NG = HTTP request succeeded and MiTM attack success.

SSL Exception = HTTP request failed due to SSL exception. Not vulnerable to attack.

Handshake Fail = HTTP request failed due to handshake failure. Not vulnerable to attack.

Client not vulnerable = HTTP request succeeded but not vulnerable to attack.



My Question is 

Why HTTPS REQUEST WITHOUT SSL CERTIFICATE HOSTNAME VERIFICATION  is not showing any Vulnerability to any of the attack?? 

According to my understanding it should be  Vulnerable to "TLS cert for wrong hostname". It should show  MiTM attack success in the server log 



FYI


I tried to modify NoSslCertificateHostnameVerificationTest.java class 

i commented  //SSLSocketFactory sslSocketFactory = (SSLSocketFactory) SSLSocketFactory.getDefault();

and added

SSLSocketFactory sslSocketFactory = TlsUtils.getTrustAllSSLSocketFactory();



And the output was expected, HTTPS REQUEST WITHOUT SSL CERTIFICATE HOSTNAME VERIFICATION   was Vulnerable to "TLS cert for wrong hostname" ( MiTM attack success)







Regards,

Swaraj Waikar 



Alex Klyubin

unread,
Feb 15, 2017, 11:44:58 AM2/15/17
to swaraj...@gmail.com, nogotofail
For the "TLS cert for wrong hostname" attack, did you obtain a valid certificate from a public CA and set up nogotofail MiTM to use this certificate?

--
You received this message because you are subscribed to the Google Groups "nogotofail" group.
To unsubscribe from this group and stop receiving emails from it, send an email to nogotofail+...@googlegroups.com.
To post to this group, send email to nogot...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/nogotofail/f45a4cef-2581-4db9-bc44-38f38b995ea4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Reply all
Reply to author
Forward
0 new messages