IO Shield is a personal platform to share Cyber Security expertise, offering:

  • Resources to build field kit for CyberSecurity researcher
  • IOT devices Reversing experiences
  • Pentesting and auditing Services
  • Tutorials
  • Cheat sheets

How to consider an IOT device ?  What are the interesting fields ? What kind of services are connected and distributed in the cloud ?

Trust me, trust me not ...

How Google detect local interception in French private network ?

In dec 2013, French Government ANSSI responsible of a MITM against Google SSL-TLS ? ... Not Exactly ...

 

Adware :

  • Superfish, installed on somes lenovo devices, uncrypted HTTPS stream for proper advertissment. The same certificate  and and key for all targets.
  • Privdog, intercept server certificate and replace it by his own (signed by his own root) . Create a certificate and a key on each device.

 

Vulnerabilities :

  • FREAK (Factoring RSA Export Keys) CVE-2015-0204, ex the Kaspersky Anti-Virus with a bad implementation of TLS and no HPKP
  • CRIME (Compression Ratio Info-Leak Made Easy) CVE-2012-4929 , ex Kaspersky Anti-Virus 16.0.0.614

Tools:

Mitigation, audit:

  • HSTS -  HTTP Strict Transport Security - web security policy mechanism which helps to protect websites against protocol downgrade attacks and cookie hijacking
  • HPKP - HTTP Public Key Pinning - security mechanism which allows HTTPS websites to resist impersonation by attackers using mis-issued or otherwise fraudulent certificates (Not supported by IE !)
  • Weak Ciphers auditing : on server side with nmap ssl-enum-ciphers and on client side with SSL Cipher suites of your browser

References :

ANSSI - 2014 - Recommandations de sécurité concernant l’analyse des flux HTTPS


 

 

Security standards, Edition and delivery date :