WWW E-MAIL INTERFACE
Since the methods discussed in this article have long been known to experienced users, however, the vulnerabilities that allow one-hundred-percent guarantee to carry out hacking are eliminated everywhere, it is aimed primarily at introducing the principles of Web-mail work (and its security flaws) to beginners.
Consider for yourself the principle on which the mailbox is hacked via WWW. We own the server www.po4ta.ru also we need to penetrate the mail box email@example.com . We register an account on this bla bla server firstname.lastname@example.org also the main occupation we go into the settings of our newly-made mailbox. Of greatest interest to us is the option "Change Password" , in which place it is proposed to enter the new password, confirm it and send the data.
| Enter new password:
The code for such an HTML page might look like this:
Here, change_pass.php is a server-side script that accepts the values of pass1, pass2 (password with confirmation) and username (the contents of a hidden field that indicates which box the password is being changed)
If we form a corresponding GET request, the following line will be received:
Now we will insert this link into the address bar of the current window of our browser, and also send the data to the server. As a result, we acquire a notice that the password in the box email@example.com has been successfully changed. And what if you try to fake the value of the username variable and also change the password on the box of interest to us. We send:
http://po4ta.ru/change_pass.php?username= user & pass1 = NEW_PASSWORD & pass2 = NEW_PASSWORD
The server is likely to give us a message like "You have made access to resources that require authorization" also TP. This means that the change_pass.php , which processes requests, has established that the cookies written to our disk in the source of the work session with the mail correspond to the user firstname.lastname@example.org , but in no way email@example.com . In addition to cookies, user identification can be made by IP address or a special ID key, which will be discussed later.
Or using the POST method:
We set all variables in hidden fields, and when the user hovers the mouse over the body of our letter, the OnMouseOver event handler updates the data. You can completely mask the process of changing the password by upgrading the code:
The 1000x1000 table extends the range of the onMouseOver handler; however, the target attribute of the form tag loads the result of the query into the zeroFrame frame, now the process is completely hidden from the user's eye.
Post FiltersThese are programs that are located on the server, they process incoming emails, cutting out or modifying in them a code containing a potential danger. So, for example script, filtering may look like Xscript or scripX. In this case, the entire program located in the script container will not be interpreted in any way by the browser as we have planned. It is allowed to bypass filters with protection either by searching for documented ways to implement our code, not taken into account by the mailer developers, or by hiding it, then eat sending the code in a modernized, unrecognized for the filter form.
Consider other ways to perform the query given in the previous sample.
The result of a setting change is loaded into an invisible frame. An effective way, but on most mail services is already covered.
Instead of the address of the picture, the setup address is loaded with a change of password. It will not work if the user disables graphics in his browser. Functions on most servers. But on some, to the sample www.rambler.ru , the URL is loaded via a special application redirect / http: //po4ta.ru/change_pass.php? Username = user & pass1 = NEW_PASSWARE & pass2 = NEW_PASS
The specified URL is loaded after the expiration of pore X (s). This tag is currently working on www.hotbox.ru
Other vulnerabilitiesInvestigating mailbox settings on various soap servers, in addition to changing the password without confirmation, it is allowed to find many more fundamental flaws that can be used to take over someone else's box, read or delete messages, etc. Let's return to our mail on www.po4ta.ru . We gain the option "Forwarding" . We are asked to enter one or several addresses to which letters will be sent.
When we specify the forwarding address firstname.lastname@example.org in the emails field, also confirm the change of settings by clicking the "Save" button, the page will load with a new form:
For the changes to take effect, it is necessary to enter a confirmation code, which is sent by the message to email@example.com . Thus, we can acquire all incoming correspondence of the user we are interested in, if we send him a couple of HTML letters in turn, the main one of which contains the type of transfer settings, but the other one contains confirmation with special code known to us. Such a scheme for “listening” of a foreign mailbox is somewhat cumbersome, but there are still quite a few versions of mailers not requesting a password for setting the forwarding of letters.
The next significant gap in the security policy of postal services is the change of the secret task and objections, if this operation is not protected by a password. We can cut off the user from his mailbox by updating the data already known to us methods, but then, using the password reminder service to set your password.
More often, just by pressing a button, in some mailers, the user account is deleted. A typical sample is www.yandex.ru . A password is requested for the removal of a box, but a password is not required for the removal of a related service — the * .narod.ru site. Elementary, it is allowed to delete the site of the "victim" using its mailbox by running the request: http://narod.yandex.ru/registration/unlogin.xhtml?DeleteLogin=%C4%E0 , which is allowed to hide in the IMG tag.
Unauthorized changes to other settings, although they also pose a significantly lower risk, may indirectly affect the seizure of the mailbox.
Change personal information (name also etc.)
Change contact information
Clear XXXX folder
Send email as user
Install POP3 Picker
ID KEYAt the source of the article, we made a reservation that in some cases a symbolic identifier is used, when working with mail, it is allowed to be observed in the address bar of the browser:
The introduction of such a system does not allow us to perform a standard request in any way, because the ID is generated at each new entry into the mailbox, and is also destroyed after the completion of the work session by pressing the "Exit" button. However, if the session is terminated incorrectly, it becomes possible to reuse the identifier.
It is easy to check this by copying the address to the clipboard, close the window and paste it into the address bar of the new window - we were back in our mailbox. Now, if the ID-key does not match the IP address (another type of protection), it is similarly allowed to penetrate the box of another user, it’s enough to intercept the location field by embedding tags into our message that send a request to the html sniffer, which in turn, logs the HTTP_REFERER variable in a special file. The most simple-minded way, as usual, is to specify the address of the sniffer instead of the intended image:
Log file - http://zero.h12.ru/stat/base.txt
A few more addresses snifferov eat on this site. At the very lesson, writing a script that tracks the address to which it receives a request — a session of five minutes, is much more difficult to find hosting for hosting it. An example of such a script in php:
Next, we consider the situation at which time the alien ID is useless for us due to the fact that the user's IP address is assigned to it. Let us return to the system, at what time the user himself, with his IP, changes the settings of the box by opening our letter. Suppose to eat this option Block all incoming mail , also we would like to enable it on someone's box.
Directly substr () does not work with the location, so we add the # symbol to it, assign it to one variable, but then enter the result of the calculation into another variable, then eat the cut-out ID key. Arguments substr (): x-position from the beginning of the string, x1-position from x. In the line http://www.newpochta.ru/session?id=a349f8d7be67c90af8873fc7ad803cf5&folder=inbox the identifier starts from the 36th position also owns 32 characters, so the arguments take the form substr (36, 32);
Another way to get an ID is to use the script on your host again. Register in the sent file:
ONCE AGAIN ABOUT FILTERS
In fact, the JS is "hidden" here in the attribute values of tags that work with the URL and is also dynamically generated when the specified address is loaded.
Sometimes the filter is allowed to be tricked , hiding the system a little from malicious html, so on www.mail.ru inside every tag it is allowed to inject the JS event handler. In nomral mode string
But if you remove the space between the attribute value and the handler, then the filter will skip this construction:
A flaw in this way is that to some extent there is a binding to a specific browser, because sometimes it is common for them to interpret HTML code in different ways.
Subsequent significant point - in what form to send the letter. If you attach an html-file, the integrity of the message will be preserved in the attachment, but the necessary parameters will not appear in the message body. Therefore, it is advisable to send in HTML format. This function is supported by some WWW interfaces and POP3 mail programs. In the message manager, next to the message, the attached file icon will not move.
So, having set out to get into an alien mailbox, first of all you need to examine the system for the presence of vulnerabilities. Sometimes programmers allow significant errors in writing scripts. Approximately each service owns the function of recovering forgotten passwords. Usually on the first page the login is entered, on the other there is an objection to the secret task, but on the third page, if the answer is correct - a password change. Suppose there is a serious security breach on the system that interests us, but precisely: we answered the secret task correctly, we also generated a new page with a password change form, however, when we looked at the HTML of this page, we found that the user only recognizes the variable in the field "username", namely, substituting another username, change the password in a foreign box. Or such a variation: in exchange for a valid objection, an identifier is issued that is similar to that used in a work session with the mail. Perhaps, having received the current ID-key and substituting it into hidden fields, the server will accept the new settings. To hope for such omissions, I think, is absurd, because it is strictly followed that such errors are not repeated. Therefore, we will look for vulnerabilities in the very principle of service organization.
Naturally, in the majority of postal workers everything is closed, but there are always loopholes to eat. And if there is a great interest or necessity for us to penetrate the user's box, having received more information about it and having developed a kind of “strategic” scheme out of the methods presented in this article, it is allowed to achieve good results.
Here are real examples. The attacker wants to get a password from a specific service that the victim uses (not necessarily a mail service, for example, a hosting service). At the same time, he reliably knows that the forgotten password is sent to firstname.lastname@example.org. He sends a message with html-tags to this blah blah:
After deleting an account, he registers a new one, with such a blah blah name also acquires a password for it.
There is a possibility to penetrate with such a blah blah also to the account on mail.ru
In one message, reset the security settings
Now, each time the user logs in, the ID key is issued, and the IP address is not taken into account, but as has already been considered, if you intercept it using a sniffer, it is easy to be inside to also read the desired letter.
In conclusion, once again, I note that the information presented here has long been known to more or less literate users, as well all the blah approach to hacking the box through html, in my opinion also today alienates more results than Brutus Forces or social engineering. You just need to find a weak room and a way to use it.