Since the methods considered in this article have long been known to experienced users, however, the vulnerabilities that allow you to completely crack the absolute guarantee are eliminated everywhere, it is aimed primarily at introducing the principles of Web-mail work (and its security flaws) to beginners.
Consider for yourself the principle on which the mailbox is hacked via WWW. We own the server www.po4ta.ru also we need to penetrate the mail box firstname.lastname@example.org . We register an account on this bla bla server email@example.com also the main occupation we go into the settings of our newly-made mailbox. Of greatest interest to us is the option "Change Password" , in which place it is proposed to enter the new password, confirm it and send the data.
| Enter new password:
The code for such an HTML page might look like this:
Here, change_pass.php is a server-side script that accepts the values of pass1, pass2 (password with confirmation) and username (the contents of a hidden field that indicates which box the password is being changed)
If we form a corresponding GET request, the following line will be received:
Now we will insert this link into the address bar of the current window of our browser, and also send the data to the server. As a result, we acquire a notice that the password in the box firstname.lastname@example.org has been successfully changed. And what if you try to fake the value of the username variable and also change the password on the mailbox we are interested in. We send:
http://po4ta.ru/change_pass.php?username= user & pass1 = NEW_PASSWORD & pass2 = NEW_PASSWORD
The server is likely to give us a message like "You have made access to resources that require authorization" also TP. This means that the change_pass.php , which processes requests, has established that the cookies written to our disk in the source of the work session with the mail correspond to the user email@example.com , but in no way firstname.lastname@example.org . In addition to cookies, user identification can be made by IP-address or a special ID-key, which will be discussed later.
Or using the POST method:
We set all variables in hidden fields, and when the user hovers the mouse over the body of our letter, the OnMouseOver event handler updates the data. You can completely disguise the process of changing the password by upgrading the code:
The 1000x1000 table extends the onMouseOver handler's scope, but the target attribute of the form tag loads the result of the query into the zeroFrame frame, now the process is completely hidden from the user's eye.
Post FiltersThese are programs that are located on the server, they process incoming emails, cutting out or modifying in them code containing a potential danger. So, for example script, filtering may look like Xscript or scripX. In this case, the entire program located in the script container will not be interpreted in any way by the browser as we have planned. It is allowed to bypass filters with protection either by searching for documented ways of introducing our code, not taken into account by the mailer developers, or by hiding it, then eat sending the code in a modernized, unrecognized for the filter form.
Consider other ways to run the query in the previous sample.
The result of a setting change is loaded into an invisible frame. An effective way, but on most mail services is already covered.
Instead of the address of the picture, the setup address is loaded with a change of password. It will not work if the user disables graphics in his browser. It functions properly on most servers. But on some, to the sample www.rambler.ru , the URL is loaded through a special application redirect / http: //po4ta.ru/change_pass.php? Username = user & pass1 = NEW_PASSWARE & pass2 = NEW_PASS
The specified URL is loaded after the expiration of pore X (s). This tag currently works on www.hotbox.ru
Other vulnerabilitiesInvestigating mailbox settings on various soap servers, in addition to changing the password without confirmation, it is allowed to find many more fundamental flaws, using which it is allowed to take over someone else's box, read or delete messages, etc. Let's return to our mail on www.po4ta.ru . We gain the option "Forwarding" . We are asked to enter one or several addresses to which letters will be sent.
When we specify the forwarding address email@example.com in the emails field, also confirm the change of settings by clicking the "Save" button, the page will load with a new form:
For the changes to take effect, it is necessary to enter a confirmation code, which is sent by the message to firstname.lastname@example.org . Thus, we can acquire all incoming correspondence of the user we are interested in, if we send him a couple of HTML letters in turn, the main one of which contains the type of transfer settings, but the other one is a confirmation with a special code known to us. Such a scheme for “listening” of a foreign mailbox is somewhat cumbersome, but there are still quite a few versions of mailers who do not request a password for setting forward emails.
The next significant gap in the security policy of postal services is the change of the secret task and objections, if this operation is not protected by a password. We can cut off the user from his mailbox by updating the data already known to us methods, but then, using the password reminder service to set your password.
More often, with just one click of a button, in some mailers the user account is deleted. A typical sample is www.yandex.ru . A password is requested for the removal of a box, but a password is not required for deletion of the associated service — the * .narod.ru site. Elementally, it is allowed to delete the victim site using its mailbox by running the query: http://narod.yandex.ru/registration/unlogin.xhtml?DeleteLogin=%C4%E0 , which can be hidden in the IMG tag.
Unauthorized changes to other settings, although they also pose a significantly lower risk, may indirectly affect the seizure of the mailbox.
Change personal information (name also etc.)
Change contact information
Clear XXXX folder
Send email as user
Install POP3 Picker
ID KEYAt the source of the article, we made a reservation that in some cases a symbolic identifier is used, when working with mail, it is allowed to be observed in the address bar of the browser:
The introduction of such a system does not allow us to perform a standard request in any way, because the ID is generated at each new entry into the mailbox, and is also destroyed after the completion of a work session by pressing the "Exit" button. However, if the session is terminated incorrectly, it becomes possible to reuse the identifier.
It is easy to check this by copying the address to the clipboard, close the window and paste it into the address bar of the new window - we were back in our mailbox. Now, if the ID-key does not match the IP address (another type of protection), it is similarly allowed to penetrate the box of another user, it’s enough to intercept the location field by embedding tags into our message that send a request to the html sniffer, which , in turn, logs the HTTP_REFERER variable in a special file. The most simple-minded way, as usual, is to specify the address of the sniffer instead of the intended image:
Log file - http://zero.h12.ru/stat/base.txt
A few more addresses snifferov eat on this site. At the very lesson, writing a script that traces the address to which it receives a request — a lesson of five minutes is much more difficult to find hosting for its placement. An example of such a script in php:
Next, we consider the situation at which time the alien ID is useless for us due to the fact that the IP address of the user is assigned to it. Let's return to the system, at what time the user himself, with his IP, changes the settings of the box by opening our letter. Suppose to eat this option Block all incoming mail , also we would like to enable it on someone's box.
Directly substr () does not work with the location, so we add the # symbol to it, assign it to one variable, but then enter the result of the calculation into another variable, then eat the cut-out ID key. Arguments substr (): x-position from the beginning of the string, x1-position from x. In the line http://www.newpochta.ru/session?id=a349f8d7be67c90af8873fc7ad803cf5&folder=inbox the identifier starts from the 36th position also owns 32 characters, so the arguments take the form substr (36, 32);
Another way to get an ID is to use the script on your host again. Register in the sent file:
ONCE AGAIN ABOUT FILTERS
In fact, the JS is "hidden" here in the attribute values of tags that work with the URL and is also dynamically generated when the specified address is loaded.
Sometimes the filter is allowed to be tricked , hiding the system a little from malicious html, so on www.mail.ru inside every tag it is allowed to inject the JS event handler. In nomral mode string
But if you remove the space between the attribute value and the handler, then the filter will skip this construction:
A flaw in this way is that to some extent there is a binding to a specific browser, because sometimes they tend to interpret HTML-code in different ways.
Subsequent significant point - how to send a letter. If you attach an html-file, the integrity of the message is preserved in the attachment, but the necessary parameters will not appear in the message body. Therefore, it is advisable to send in HTML format. This function is supported by some WWW interfaces and POP3 mail programs. In the message manager, next to the message, the attached file icon will not move.
So, having set out to get into an alien mailbox, first of all you need to examine the system for the presence of vulnerabilities. Sometimes programmers allow significant errors in writing scripts. Approximately each service has the function of recovering forgotten passwords. Usually on the first page the login is entered, on the other there is an objection to the secret task, but on the third page, if the answer is correct - a password change. Suppose there is a serious security breach on the system that interests us, but precisely: we answered the secret task correctly, we also generated a new page with a password change form, however, when we looked at the HTML of this page, we found that the user only recognizes the variable in the field "username", namely, substituting another username, change the password in a foreign box. Or such a variation: in exchange for a valid objection, an identifier is issued that is similar to that used during a work session with mail. Perhaps, having received the current ID-key also substituting in the hidden fields, the server will accept the new settings. To hope for such omissions, I think, is absurd, because it is strictly followed that such errors are not repeated. Therefore, we will look for vulnerabilities in the very principle of service organization.
Naturally, in the majority of postal workers everything is closed, but there are always loopholes to eat. And if there is a great interest or necessity for us to penetrate the user's box, having received more information about it and having developed a kind of “strategic” scheme out of the methods presented in this article, it is allowed to achieve good results.
Here are real examples. The attacker wants to get a password from a particular service, which is used by the "victim" (not necessarily email, for example hosting). At the same time, he reliably knows that the forgotten password is sent to email@example.com. He sends a message with html-tags to this blah blah:
After deleting the account, he registers a new one, with the same name he also acquires a password for it.
The opportunity to penetrate with such a blah blah also to the account on mail.ru has been preserved. In one message, reset the security settings
Now, each time the user logs in, the ID key is issued, and the IP address is not taken into account, but as has already been considered, if you intercept it using a sniffer, it is easy to be inside to also read the desired letter.
In conclusion, once again I will note that the information presented here has long been known to more or less literate users, as well as all the blah approach to cracking the box through html, in my opinion also today alienates more results than Brutus Forces or social engineering. You just need to find a weak room and a way to use it.