DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


SSL And TLS Attacks | Weak Ciphers

SSL And TLS Attacks | Weak Ciphers


Both SSL and TLS protocols works on the basis of Public Key Infrastructure (PKI) and commonly includes key exchange algorithm to handle security. Apart from just CA authority the strength of SSL cipher depends on length of key, encryption algorithm used to encipher data and Message Authentication Code (also known as SSL MAC). In this post we will have our look on how key length could effect on cipher strength. So depending on the length of initial key generated for data exchange during SSL and TLS communication, ciphers can be divided into following categories.


Null Security Ciphers:
As name suggests these ciphers do not provide any security since there's no encryption.

Weak Security Ciphers:
All ciphers with key length less than 128 bits fall under this category. Ciphers using Diffie Hellman algorithm for key exchange are also considered as weak security ciphers since they are vulnerable to man-in-the-middle-attack.

Strong Security Ciphers:
Ciphers with key length more than 128 bits and less than 256 bits are considered as strong security ciphers.

Super Strong Ciphers:
Keys in this ciphers use 256 bit keys with AES encryption. These are considered as highly secured and used by high octane organizations and research institutes.

As discussed in our previous post ciphers are actually decided with the help of Cipher suites defined to encipher data. At present there are more than 30 different cipher suites used to encipher data out of which only following are considered as secure.

DH-DSS-AES128-SHA
DH-RSA-AES128-SHA
DHE-DSS-RCA-SHA
DHE-DSS-RC4-SHA
DHE-DSS-AES128-SHA
DHE-RSA-AES123-SHA
RC4-MD5
RC4-SHA
AES128-SHA
DES-CBC3-SHA
DH-DSS-AES256-SHA
DH-RSA-AES256-SHA
DHE-DSS-AES256-SHA
DHE-RSA-AES256-SHA
AES256-SHA

Rest all are classified under weak cipher suites. Each and every initial after hyphen represents an encryption algorithm for cipher suite.

Dangers Posed By Weak Ciphers:
The attacker can interrupt communication between client and server and downgrade connection to use HTTP instead of HTTPS. This can be done by ARP poisoning and using SSL strip by Moxie Marlin Spike.
The attacker can use hardware protocol analyzer to capture packets directly from wire and then decipher them.
If attacker is well knowledged with application and its working, he can actually code another program to change meaning of messages transferred during communication.

Tools That Can Be Used To Detect Weak Ciphers:
Foundstone SSL Digger and THC SSL Check are two awesome tools that can be used to check SSL cipher strengths. Both are easy install and go tools. Just input site name and they'll analyze site for weak SSL ciphers.

Countermeasures Against Weak SSL Cipher Attacks:
The best way to counter weal SSL Cipher attacks is to disable them. Check your server's how to or help pages to disable weak ciphers.

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security