Frackin script kiddies!!

Richard Pieri richard.pieri-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Wed Aug 4 16:50:31 EDT 2010


On Aug 4, 2010, at 4:27 PM, Derek Martin wrote:
> 
> Sure it can; all you need to do is brute-force the key.  It's just a
> string of bits, after all...  What makes it effective is it takes
> much, much longer to do that, such as to make it impractical.  But it
> can be done.

Teach me to leave something out :).  In this case, I meant brute force against the authentication mechanism.  This is entirely independent of the SSL wrapper.

> This is crazy.  Because SSL + auth-digest is auth + encryption...  And

No, it isn't.  It's auth *after* encryption.  That is, an encrypted link is created between two parties without either party authenticating the other.  Insert MitM attack here.  Then the authentication step happens -- with the man in the middle logging your transactions.

[...]

> This I agree with.  The point being that if the pro picks your car,
> he's probably going to steal it regardless of what you did to try to
> stop him.  If he's determined, he can always just tow it.

Of course, the analogy doesn't carry over.  Data center infiltration is a different skill set :).

--Rich P.








More information about the Discuss mailing list