http://securitytube.net/Defeating-SSL-using-SSLStrip-(Marlinspike-Blackhat)-video.aspx
Marlinspike made a great presentation in Blackhat this year on how to subvert SSL (HTTPS) protection used bu major sites around the Internet for security. The interesting thing is that he does not really break the SSL protocol itself, but instead demonstrates that as HTTP is the entry point into any SSL communication, subverting HTTP allows a hacker to take control of the HTTPS communication as well.
Marlinspike also released the SSLStrip tool to automate this attack, however i was not able to locate it yet on his website. If anyone finds it someplace, please post a link in the comments section. Using the SSLStrip tool Marlinspike was able to retreive over 130 usernames and passwords over a Tor network. These credentials were from sites such as Gmail, Yahoo, Linkedin, Paypal etc.
The way the SSLStrip tool works by:
- Does an MITM on the HTTP connection
- Replaces all the HTTPS links with HTTP ones but remembers the links which were changed
- Communicates with the victim client on an HTTP connection for any secure link
- Communicates with the legitimate server over HTTPS for the same secure link
- Communication is transparently proxied between the victim client and the legitimate server
- Images such as the favicon are replaced by images of the familiar "secure lock" icon, to build trust
- As the MITM is taking places all passwords, credentials etc are stolen without the Client knowing
Marlinspike also discusses other techniques such as homograph attacks to make a URL look like a legitimate one. The overall talk is very interesting. You can download the presentation slides here. The video posted below is of the actual Blackhat talk given by Marlinspike.
You can download a High Resolution video of the presentation here.