Main » 2011 January 21 » Hacking Gmail using the GX cookie Loophole and Its Solution(video added)
2:48 PM Hacking Gmail using the GX cookie Loophole and Its Solution(video added) | |
Hey
Guys as a Ethical hacker I am always curious to Find the New Loopholes
in Existing websites ,softwares and other things... Today over
the Internet I found a Very Dangerous Loophole in the Gmail (Best Mailing Services
In the World) and I am Going to Share that With You Guys. I have Tried
this from my college Network so there Will be Some Assumptions and Tools
Needed for that... So Read On... NOTE: THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY ! HEY GOOGLE STAFF IF YOU FINAL THIS AS INAPPROPRIATE CONTENT. PLEASE INFORM ME TO REMOVE THIS THANKS! SOME ASSUMPTIONS:
Tool used for this attack:
(ALL THE TOOLS MENTIONED HERE ARE AVAILABLE FOR FREE DOWNLOADS YOU JUST HAVE TO GOOGLE THEM) Attack in detail: We assume you are connected to LAN/Wireless network. Our main goal is to capture Gmail GX cookie from the network. We can only capture cookie when someone is actually using his gmail. I’ve noticed normally in free Classes in College when people normally check their emails. If you are in cyber café or in Mall then there are more chances of catching people using Gmail. We will go step by step, If you are using Wireless network then you can skip this Step A. A.) Using Cain to do ARP poisoning and routing: Switch
allows unicast traffic mainly to pass through its ports. When X and Y
are communicating eachother in switch network then Z will not come to
know what X & Y are communicating, so inorder to sniff that
communication you would have to poison ARP table of switch for X &
Y. In Wireless you don’t have to do poisoning because Wireless Access points act like HUB which forwards any communication to all its ports (recipients).
All hosts in my subnet and then press Ok. This will list all host connected in your network. You will notice you won’t see your Physical IP of your machine in that list. How to check your physical IP ?
It will have following outputs:
IP Address............:192.168.1.2 Main thing to know here is your IP address and your Default Gateway. FOR AMU Its : 10.10.50.1 FOR BSNL Its : 192.168.1.1 Make a note of your IP Address & default gateway. From Cain you will see list of IP addresses, here you have to choose any free IP address which is not used anywhere. We assume IP 192.168.1.10 is not used anywhere in the network.
Type in 192.168.1.10 and from the poisoning section click on "Use ARP request Packets” and click on OK.
The purpose is to do ARP poisoning between victim and the default gateway and route the victim traffic via your machine. From the left side click on Victim IP address, we assume victim is using 192.168.1.15. The moment you click on victim IP you will see remaining list on the right hand side here you have to select default gateway IP address i.e. 192.168.1.1 then click on OK.
B.) Using Network Miner to capture cookie in plain text We are using Network miner to capture cookie, but Network miner can be used for manythings from capturing text , image, HTTP parameters, files. Network Miner is normally used in Passive reconnaissance to collect IP, domain and OS finger print of the connected device to your machine. If you don’t have Network miner you can use any other sniffer available like Wireshark, Iris network scanner, NetWitness etc. We are using This tool because of its ease to use.
Important thing before you start this make sure you are not browsing any websites, or using any Instant Mesaging and you have cleared all cookies from firefox.
Example : GX= axcvb1mzdwkfefv ; ßcopy only axcvb1mzdwkfefv Now we have captured GX cookie its time now to use this cookie and replay the attack and log in to victim email id, for this we will use firefox and cookie editor add-ons. C.) Using Firefox & cookie Editor to replay attack.
SOLUTION: HOW TO PROTECT URSELF FROM THIS HACK Google
has provided a way out for this attack where you can use secure cookie
instead of unsecure cookie. You can enable secure cookie option to
always use https from Gmail settings. Settings > Browser connection > Always use https . I Hope You Have Enjoyed This ... Any Queries ?? Please Comment ! VIDEO OF ABOVE WORK: | |
|
Total comments: 0 | |