True, but it seems unnecessarily hard core: it affects all your traffic, which means you need to do a lot more work than set up a simple HTTP gateway.
Furthermore, the DNS approach lets you selectively hijack those specific domains that you have an attack package ready for: there's no value in hijacking a domain you aren't prepared to abuse, as it just increases the chance of detection. But wow, I'm amazed this doesn't happen more. It seems like this would be the most obvious way to spread a virus. Indeed, I could imagine creating a proxy that auto-infects every executable file that comes through it (just add a silent rootkit installer that runs before the real installer). -david Alex Pankratov wrote: > The exact same effect can be achieved with ARP spoofing. The > hijacker simply convinces your machine that he is a default > gateway, and voila, he has full access to all your Internet- > bound traffic. > > Alex > >> -----Original Message----- >> From: p2p-hackers-boun...@lists.zooko.com [mailto:p2p-hackers- >> boun...@lists.zooko.com] On Behalf Of David Barrett >> Sent: May 25, 2009 2:47 PM >> To: theory and practice of decentralized computer networks >> Subject: Re: [p2p-hackers] DNS hijacking? >> >> It's not eavesdropping I'm concerned about. I'm thinking with this >> attack you could inject malicious code into otherwise innocuous HTTP >> traffic. For example, you might add a "Install the latest Google >> Toolbar!" link straight into the live, functional Google homepage, and >> even make that link look like it's coming straight from >> http://google.com, but then host a virus-infected version of Google >> Toolbar. >> >> -david >> >> Tien Tuan Anh Dinh wrote: >>>> I'm primarily thinking of a wifi office or internet cafe; can't >>>> everybody sniff everybody else's traffic (including DNS requests)? >> Does >>>> this mean that every wifi network is vulnerable to this really easy >>>> attack, and there's basically no defense other than upgrading all of >> DNS? >>> When your traffic is in plain-text while you're in a wifi cafe, you >> give >>> your privacy to the one operating that access point already. >>> >>> https was designed for these scenarios. When your traffic is >> sensitive, >>> use https. >>> >>> I'm wondering what would one gain by eavesdropping unimportant >> traffic >>> of others in an Internet cafe? I'm not sure if this attack can cause >> any >>> noticeable damage. >>> >>> A. >>> >>> >>> >>> >>> >>> _______________________________________________ >>> p2p-hackers mailing list >>> p2p-hackers@lists.zooko.com >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers