SlideShare a Scribd company logo
DOUBLEDIRECT
– MAN-IN-THE-MIDDLE ATTACK
(MITM) IN MOBILE DEVICES
101015275_DoubleDirect_Chandrak Trivedi
1
INTRODUCTION
101015275_DoubleDirect_Chandrak Trivedi
2
• Dangerous type of MitM attack technique.
• Explioted against Android, iPhone and Mac users around the world.
Windows and Linux are not affected.
• It was used to redirect victim’s traffic from websites domains.
• Once done, attackers can steal victims’ valuable personal data, such as
email IDs, login credentials and banking information.
• The traffic from various popular websites, including Google, Facebook,
Twitter, Hotmail, Live.com, Naver.com (Korean) and others had redirected.
• The attacks have been tracked to more than 30 countries around the globe,
including the US, Canada, the UK, Germany, Spain, China, India, Australia,
and Mexico, among many others.
TECHNOLOGY USED
101015275_DoubleDirect_Chandrak Trivedi
3
• Routers – IP routes.
• HTTP and ICMP packets -
 ICMP Redirect Functionality.
 ICMP packets are a legitimate form of communication between
routers and hosts that lets the network host know that a better
route to a certain destination (Google, Facebook, etc.) is available.
• ICMP Redirect -
 ICMP redirects are used for legitimate purposes by routers on local
networks to let hosts know if there is a better route to the Internet
than the default gateway, or if there is a different gateway that
should be used.
• Often used as an alternative to an ARP poisoning attack technique.
• ICMP Redirect with publicly available tools like Ettercap.
ANALYSIS
101015275_DoubleDirect_Chandrak Trivedi
4
Service Provider
Network
User Device
Attacker
Route
CONCLUSION
101015275_DoubleDirect_Chandrak Trivedi
5
• Some operating system vendors have yet to implement protection at this
point for ICMP Redirect attacks.
Countermeasures:
• While the best way to prevent ICMP redirects is to change networks to not
allow changes from untrusted or unauthenticated sources, this is an
impractical fix.
• Vendors should monitor networks for ICMP redirects with an intrusion
detection system.
• All Mac and Android Users can disable ICMP redirect manually.
• For Android users, Download
zIPS – Zimperium Mobile IPS – protection against advanced host and network mobile
attacks, including DoubleDirect.
zANTI2 – Mobile Diagnostics to perform DoubleDirect
• For Apple Users,
Apple Fixed a Nasty MitM Vulnerability in the Latest watchOS
• Most of GNU/Linux and Windows operating system do not accept ICMP
redirect packets.
101015275_DoubleDirect_Chandrak Trivedi
6
Mobile Device are the Second best source for
Attackers, so be aware and keep Mobile device as
secure as your Personal computer.

More Related Content

What's hot

Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
HugoBarrionuevoSobri
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
MarianaGilMartnez1
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
Kashif Sohail
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
Will Hatcher
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
Jitendar
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
Security Bootcamp
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
Centextech
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
Sumaiya Ismail
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
abdul talha
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarNasir Bhutta
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
Girija Sankar Dash
 
Hacking
HackingHacking
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Bryley Systems Inc.
 
Network security
Network securityNetwork security
Network security
Eshrak Rahman
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
Nisha Menon K
 

What's hot (20)

Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Homework0703
Homework0703Homework0703
Homework0703
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Hacking
HackingHacking
Hacking
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 

Viewers also liked

Change 2
Change 2Change 2
Change 2
Raja Kishor D
 
Consideraciones en torno a la discapacidad
Consideraciones en torno a la discapacidadConsideraciones en torno a la discapacidad
Consideraciones en torno a la discapacidad
Luis Ruiz Alvarez
 
Uml 1 2-3 praktikum rec
Uml 1 2-3 praktikum recUml 1 2-3 praktikum rec
Uml 1 2-3 praktikum rec
saifur rizal
 
Project 5
Project 5Project 5
Project 5
Wael Sharba
 
відкриття конференції «Моя планета – мій дім!»
відкриття конференції «Моя планета – мій дім!»відкриття конференції «Моя планета – мій дім!»
відкриття конференції «Моя планета – мій дім!»
Антон
 
Webinar - SMSF Tax Planning
Webinar - SMSF Tax PlanningWebinar - SMSF Tax Planning
Webinar - SMSF Tax Planning
The SMSF Academy Pty Ltd
 
Usa map powerpoint and background
Usa map powerpoint and backgroundUsa map powerpoint and background
Usa map powerpoint and background
Allyster Campbell
 
Mi alma gemela en el poema el buscador
Mi alma gemela en el poema el buscador Mi alma gemela en el poema el buscador
Mi alma gemela en el poema el buscador
Angel Ernesto Gonzales Castilla
 
Wiraswasta 1
Wiraswasta 1Wiraswasta 1
Wiraswasta 1
saifur rizal
 
PPT- Global IVF Market
PPT- Global IVF MarketPPT- Global IVF Market
PPT- Global IVF MarketPreeti Singh
 
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica IntegrataKinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
Rolando Dini
 
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
David Syahputra
 
Lean Agile Scotland - Kanban in the Scottish Government
Lean Agile Scotland - Kanban in the Scottish GovernmentLean Agile Scotland - Kanban in the Scottish Government
Lean Agile Scotland - Kanban in the Scottish Government
mygov_scot
 
Questions for Fun
 Questions for Fun Questions for Fun
Questions for Fun
Kitt Depatie
 

Viewers also liked (15)

Change 2
Change 2Change 2
Change 2
 
Consideraciones en torno a la discapacidad
Consideraciones en torno a la discapacidadConsideraciones en torno a la discapacidad
Consideraciones en torno a la discapacidad
 
Uml 1 2-3 praktikum rec
Uml 1 2-3 praktikum recUml 1 2-3 praktikum rec
Uml 1 2-3 praktikum rec
 
Project 5
Project 5Project 5
Project 5
 
відкриття конференції «Моя планета – мій дім!»
відкриття конференції «Моя планета – мій дім!»відкриття конференції «Моя планета – мій дім!»
відкриття конференції «Моя планета – мій дім!»
 
Webinar - SMSF Tax Planning
Webinar - SMSF Tax PlanningWebinar - SMSF Tax Planning
Webinar - SMSF Tax Planning
 
Usa map powerpoint and background
Usa map powerpoint and backgroundUsa map powerpoint and background
Usa map powerpoint and background
 
Mi alma gemela en el poema el buscador
Mi alma gemela en el poema el buscador Mi alma gemela en el poema el buscador
Mi alma gemela en el poema el buscador
 
Tyler Schott
Tyler Schott Tyler Schott
Tyler Schott
 
Wiraswasta 1
Wiraswasta 1Wiraswasta 1
Wiraswasta 1
 
PPT- Global IVF Market
PPT- Global IVF MarketPPT- Global IVF Market
PPT- Global IVF Market
 
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica IntegrataKinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
Kinesiologia Applicata: modulo 1 del corso di Kinesiologia Olistica Integrata
 
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
Pelajaran Sekolah SABAT ke-9 Triwulan 4 2015
 
Lean Agile Scotland - Kanban in the Scottish Government
Lean Agile Scotland - Kanban in the Scottish GovernmentLean Agile Scotland - Kanban in the Scottish Government
Lean Agile Scotland - Kanban in the Scottish Government
 
Questions for Fun
 Questions for Fun Questions for Fun
Questions for Fun
 

Similar to DoubleDirect - MitM

CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
CODE BLUE
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
EnergySec
 
OPTICAL FIBERS.pdf
OPTICAL FIBERS.pdfOPTICAL FIBERS.pdf
OPTICAL FIBERS.pdf
SanjanaSingh158
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Rakuten Group, Inc.
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
Computer Security: Principles of Information Security
Computer Security: Principles of Information SecurityComputer Security: Principles of Information Security
Computer Security: Principles of Information Security
elipanganiban15
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
Digital Bond
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
Eric Vanderburg
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
BSIT3CD_Continuation of Cyber incident response (1).pdf
BSIT3CD_Continuation of Cyber incident response (1).pdfBSIT3CD_Continuation of Cyber incident response (1).pdf
BSIT3CD_Continuation of Cyber incident response (1).pdf
StevenJoeBiago
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
ShahMDGolamRahmanNay
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Network security
Network securityNetwork security
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
Panda Security
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Great Bay Software
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 

Similar to DoubleDirect - MitM (20)

CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
OPTICAL FIBERS.pdf
OPTICAL FIBERS.pdfOPTICAL FIBERS.pdf
OPTICAL FIBERS.pdf
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Computer Security: Principles of Information Security
Computer Security: Principles of Information SecurityComputer Security: Principles of Information Security
Computer Security: Principles of Information Security
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
BSIT3CD_Continuation of Cyber incident response (1).pdf
BSIT3CD_Continuation of Cyber incident response (1).pdfBSIT3CD_Continuation of Cyber incident response (1).pdf
BSIT3CD_Continuation of Cyber incident response (1).pdf
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Network security
Network securityNetwork security
Network security
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 

More from Chandrak Trivedi

Force Field Analysis
Force Field AnalysisForce Field Analysis
Force Field Analysis
Chandrak Trivedi
 
Report on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industryReport on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industry
Chandrak Trivedi
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
Chandrak Trivedi
 
Human factors - The weakest link
Human factors - The weakest linkHuman factors - The weakest link
Human factors - The weakest link
Chandrak Trivedi
 
OpenVAS: Vulnerability Assessment Scanner
OpenVAS: Vulnerability Assessment ScannerOpenVAS: Vulnerability Assessment Scanner
OpenVAS: Vulnerability Assessment Scanner
Chandrak Trivedi
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
Chandrak Trivedi
 
Honeypot
HoneypotHoneypot

More from Chandrak Trivedi (8)

Force Field Analysis
Force Field AnalysisForce Field Analysis
Force Field Analysis
 
Report on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industryReport on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industry
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
 
Human factors - The weakest link
Human factors - The weakest linkHuman factors - The weakest link
Human factors - The weakest link
 
OpenVAS: Vulnerability Assessment Scanner
OpenVAS: Vulnerability Assessment ScannerOpenVAS: Vulnerability Assessment Scanner
OpenVAS: Vulnerability Assessment Scanner
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
 
Honeypot
HoneypotHoneypot
Honeypot
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

DoubleDirect - MitM

  • 1. DOUBLEDIRECT – MAN-IN-THE-MIDDLE ATTACK (MITM) IN MOBILE DEVICES 101015275_DoubleDirect_Chandrak Trivedi 1
  • 2. INTRODUCTION 101015275_DoubleDirect_Chandrak Trivedi 2 • Dangerous type of MitM attack technique. • Explioted against Android, iPhone and Mac users around the world. Windows and Linux are not affected. • It was used to redirect victim’s traffic from websites domains. • Once done, attackers can steal victims’ valuable personal data, such as email IDs, login credentials and banking information. • The traffic from various popular websites, including Google, Facebook, Twitter, Hotmail, Live.com, Naver.com (Korean) and others had redirected. • The attacks have been tracked to more than 30 countries around the globe, including the US, Canada, the UK, Germany, Spain, China, India, Australia, and Mexico, among many others.
  • 3. TECHNOLOGY USED 101015275_DoubleDirect_Chandrak Trivedi 3 • Routers – IP routes. • HTTP and ICMP packets -  ICMP Redirect Functionality.  ICMP packets are a legitimate form of communication between routers and hosts that lets the network host know that a better route to a certain destination (Google, Facebook, etc.) is available. • ICMP Redirect -  ICMP redirects are used for legitimate purposes by routers on local networks to let hosts know if there is a better route to the Internet than the default gateway, or if there is a different gateway that should be used. • Often used as an alternative to an ARP poisoning attack technique. • ICMP Redirect with publicly available tools like Ettercap.
  • 5. CONCLUSION 101015275_DoubleDirect_Chandrak Trivedi 5 • Some operating system vendors have yet to implement protection at this point for ICMP Redirect attacks. Countermeasures: • While the best way to prevent ICMP redirects is to change networks to not allow changes from untrusted or unauthenticated sources, this is an impractical fix. • Vendors should monitor networks for ICMP redirects with an intrusion detection system. • All Mac and Android Users can disable ICMP redirect manually. • For Android users, Download zIPS – Zimperium Mobile IPS – protection against advanced host and network mobile attacks, including DoubleDirect. zANTI2 – Mobile Diagnostics to perform DoubleDirect • For Apple Users, Apple Fixed a Nasty MitM Vulnerability in the Latest watchOS • Most of GNU/Linux and Windows operating system do not accept ICMP redirect packets.
  • 6. 101015275_DoubleDirect_Chandrak Trivedi 6 Mobile Device are the Second best source for Attackers, so be aware and keep Mobile device as secure as your Personal computer.

Editor's Notes

  1. Point 2 contd - The most Android devices tested appeared to be at risk, including Nexus 5 and Lollipop, as well as iOS users. The attack was successful on Apple’s latest version (8.1.1), with the possibility of also impacting Mac OS X Yosemite users. Point 4 contd - as well as can deliver malware to the targeted mobile device. Infection device can also impact cooperate devices or network. Point 5 - during the attacks on victim’s devices in an effort to collect valuable personal data.
  2. - function ICMP redirect. Used for different purpose but attacker’s used it efficiently so it turn out to be vulnerability in ICMP redirect. - Ettercap is a comprehensive suite for man in the middle attacks.
  3. - In the DoubleDirect attack, a hacker hijacks DNS connections with IMCP redirects and then does an ICMP redirect on all of the hosts on the network connected to the DNS server. In the ICMP redirect, the attacker tells victim systems there is a better route to use and intercepts all traffic from the victim system to perform a man-in-the-middle or man-in-the-mobile attack.
  4. Contd… investigate any ICMP redirect packets with sources other than approved routers. Alternately, the network could block any sources of ICMP redirect packets other than from approved routers. Endpoints should have ICMP redirect functionality enabled by default (like Windows and Linux do) to prevent this attack. Otherwise, a host-based intrusion prevention system that blocks ICMP redirects can be used.