One of the central points of failure is an email address. We use email addresses used to get access to our bank accounts, social networks and much more. For SMB and Enterprise, email addresses are the most often targeted entry point for advanced persistent threat (APT) attacks.
But how good are we are at protecting our email accounts?
There's always a compromise between security and usability. There were times when you would need to obtain all the information about smtp/pop/imap servers and enter them in order to configure your email account. Now it is as simple as just typing your email and password. But when you rely on technology that simplifies your life, it is always complex and sophisticated inside and there is always a huge risk of failure in implementation. chance of failure to implement it.
In our presentation we will disclose severe vulnerabilities of mail clients as well as software services that could lead an attacker to take over access to sensitive user information - sometimes including usernames and passwords.
We'll also demonstrate how improper email client implementation can leak user credentials and what software developers, server administrators and users can do to prevent it.
Attendees will see a live data feed with popular email client names and who's leaking what. At the final part of our presentation we'll talk about other attacks and what power attackers can potentially get in the case of vulnerable client implementations.
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Black Hat Asia 2017: ALL YOUR EMAILS BELONG TO US: EXPLOITING VULNERABLE EMAIL CLIENTS VIA DOMAIN NAME COLLISION
1. ALL YOUR EMAILS BELONG TO US
March 2017
Ilya Nesterov, Max Goncharov
Exploiting vulnerable email clients via domain name collision
2. Ilya Nesterov
I break things
I build things to break things
Security researcher
Shape Security
Who we are
Max Goncharov
Security researcher
Threat OSINT
Vuln. hunter
Shape Security
8. 2017
Lync Server
2010
Part of mobility program
for easier data exchange.
Introduced HTTP and
HTTPS Autodiscover
process.
Autodiscover : History
2006 2008 20102009
9. Here we are
With Autodiscover
We found severe
vulnerabilities in some
autodiscover client
implementations.
Autodiscover : History
2006 2008 2009 2010 2017
11. Defining the candidate pool
1. Query LDAP or AD servers
2. Derive URL from the email address
3. Query DNS for Autodiscover SRV records
4. Send an unauthenticated GET request
5. Prioritize
20. 13MTotal requests received
26Domains in experiment
7Month period
Sep 2016 - March 2017
9MRequests with Basic
Authentication header
2473Different Autodiscover
client user-agents
212KEmail accounts affected from
65K different domains
RESULTS
21. Users:
- use recommended email clients
- install security updates
MITIGATION
Enterprise:
- follow official deployment guides
- use only supported email clients
- test all third party clients
- check your deployment regularly
Developers:
- follow Autodiscover specification
- derive local and domain parts properly
- remember TLD and public suffix list
- test, test, test
ICANN:
- ban autodiscover domain registration
22. EMAIL IS COMPLICATED
It is even more complicated than you think!
READ THE DOCS!
Even if you read it. Read between the lines
NOBODY IS PERFECT
We all make mistakes. Let’s learn from someone else’s experience
Conclusion