Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

2FA compromised in new attack

Options

Comments

  • Registered Users Posts: 2,809 ✭✭✭edanto


    Attacks just keep getting cleverer. That's fairly nifty.


  • Registered Users Posts: 5,112 ✭✭✭Blowfish


    Unless I'm missing something, doesn't HSTS defeat this?

    [edit] Actually, I suppose it partially does, but the attack can still work if you can get the user to click on a different URL. Victim connects to g00gle.com, proxy then connects to google.com. I should really read the article fully before responding.


  • Registered Users Posts: 1,363 ✭✭✭ezra_


    I messed about with a little chome extension that basically matched Headers and URLS against the current URL.
    So if you were visiting a site that said 'GMail Login' and had an url of accounts.google.com, and you then hit 'GMail Login' and had a different URL, you'd get an popup warning.

    I stopped when I realised just how many websites have 'Home' as the title.


Advertisement