Skip to main content

Wireless Hacking - Part2

THE DEVELOPMENT OF DISPLAYING SSL CERTIFICATES IN A BROWSER

Displaying an SSL certificate in a browser is one of the aspects of using the internet. This originally unremarkable problem has gradually become a big topic, which affects not only security, but marketing as well. Let us look at how displaying SSL certificates in browsers has developed. You might be surprised how often this changes and how much it has deviated from its original purpose.

ThE BEGINNINGS

Encrypting the web with an SSL certificate has its origins in the 1990s. One of the first certification authorities – Thawte – was founded in 1995 and is still very popular today. The HTTP and HTTPS web protocols for encrypted web have been with us (with forced modernization) for 20 years.

Connecting to the internet was not common for computer users at the time, and web encrypting was an exception.Besides, until 2007, there were only two types of certificates – simple ones without information about the owner (domain validated, DV), and certificates with verified information about the owner (organization validated, OV).

As a result, the lock icon appeared in the status bar (typically in Internet Explorer 7 and 8 browsers). The situation started changing with new competition, and browsers started informing users about HTTPS more. In its first version (2004), Firefox used a lock icon similar to Explorer, but later it highlighted certificates in blue.


In its very first version (2009), Chrome dealt with displaying certificates in a similar way. However, as it already knew EV certificates, it was able to write the details of the organization.


THE ARRIVAL OF EV CERTIFICATES

In 2007, CAB forum (certification authority browser forum) released a new certificate type with extended verification.Its main contribution was to display the name of the organization next to the address bar. This item is called “EV green bar“ - and it really was green in the past.


In the older versions of Internet Explorer, the whole web address bar with an EV certificate had a green background.This very noticeable feature was, unfortunately, used only in Microsoft browsers. Nowadays, the browsers do not display a whole line with coloured background, but only a small part with the name of the organization next to the address bar. This was probably the ideal version of displaying an EV certificate.


Recently, there has been a trend of “decoloring” the green bar, which was started by Mozilla. Their “green bar” has been getting gradually lighter over the years, and now it is more white than green, with very subtle green text. For a user, this is certainly less beneficial than in the past. Chrome has adopted this colouring and the originally green address bar looks almost identical in both browsers.

The Development of Mobile Devices

After the introduction of the first iPhone 2007, smartphones and later tablets grew in popularity. Most internet users nowadays access the internet from a mobile device rather than a desktop.

In mobile browser versions, a typical black lock usually symbolizes SSL certificates on a website. An EV certificate is not displayed as a green bar but as the name of the organization in green font.


These days, mobile devices can deal with certificates without problems, the same as desktops. However, displaying the certificate detail is more complicated because it is done by tapping the lock icon, which requires dexterity.



Revolution of Microsoft with Edge

A true revolution – but not in a positive sense of the word – was caused by Microsoft's browser EDGE. In 2015, it issued a successor for Internet Explorer, which shocked, besides other things, by the fact that it does not enable display of an SSL certificate's detail on a website. Therefore, you cannot view its detail, and its authentication aspect with the data verified by a certification authority is compromised. You can see the name of the organization in a green bar only in the case of EV certificates with extended verification.

Simplifying Security Indicators

At the end of 2016, Google published the results of a study, which was looking for ideal security symbols for security warnings in a browser. Because of this study, three new symbols were created in order to simplify the browser notifications. The survey established that for these symbols, the icon is significant, not the colour. It turned out that browser users do not mind whether the warning is red, blue or black; the colour is not directly related to the character of the message and the majority does not understand red as a warning. Therefore, Chrome focuses mainly on a clear symbol and it displays one of three symbols for different statuses – a green lock, an informative “i” and a red triangle.


Firefox is planning to adopt the results of the study, but for now, it uses its own symbols. An average certificate is displayed with a green lock, and an EV certificate has the name of the organization in green letters on a light bar.

Hiding the Certification Detail Due to Simplification

These days, we have been witnessing the greatest simplification of browsers. Microsoft's Edge did not worry about certificates and simplified them. Now it is not possible to find information about a certificate. Apparently, Google got inspired and probably also believes that certificate details are not useful for the user. After clicking on the green bar or on the lock icon, the certificate details do not show, you have to use the F12 button to see them.

Mozilla does display the certificate detail, albeit after several clicks. However, if there is a security problem (e.g. if you receive an untrustworthy certificate), there are problems with displaying it. The certificate is displayed in Base64, which is too complicated for most users.


What next?

Securing websites is a hot topic now and it certainly receives the most attention. Almost every internet user is,nowadays, aware how important it is to protect their personal and confidential information. After 10 years with EV certificates, the market has reached the point when they are not only used by banks and financial institutions, and website owners consider it a benefit to their visitors when the certificates' importance, from the authentication point of view, is respected.

Therefore, it is surprising that browser producers have decided to remove certificate details, despite the fact that they have tried to teach users for years to check their own security. One possible explanation might be the future development of HTTP/2 and the fact that all domains will be secured by a certificate in the future. Nevertheless, even then it will be desirable to check certificate information and origins on the website.

I hope that the occurring problems will be noticed by browser producers and that they will go back to the conservative design. If that is not the case, we will have to verify the certificate details on a website with OpenSSL, which is not very user friendly.


Popular posts from this blog

Haking On Demand_WireShark - Part 5

Detect/Analyze Scanning Traffic Using Wireshark “Wireshark”, the world’s most popular Network Protocol Analyzer is a multipurpose tool. It can be used as a Packet Sniffer, Network Analyser, Protocol Analyser & Forensic tool. Through this article my focus is on how to use Wireshark to detect/analyze any scanning & suspect traffic. Let’s start with Scanning first. As a thief studies surroundings before stealing something from a target, similarly attackers or hackers also perform foot printing and scanning before the actual attack. In this phase, they want to collect all possible information about the target so that they can plan their attack accordingly. If we talk about scanning here they want to collect details like: • Which IP addresses are in use? • Which port/services are active on those IPs? • Which platform (Operating System) is in use? • What are the vulnerabilities & other similar kinds of information. • Now moving to some popular scan methods and ho

Bypassing Web Application Firewall Part - 2

WAF Bypassing with SQL Injection HTTP Parameter Pollution & Encoding Techniques HTTP Parameter Pollution is an attack where we have the ability to override or add HTTP GET/POST parameters by injecting string delimiters. HPP can be distinguished in two categories, client-side and server-side, and the exploitation of HPP can result in the following outcomes:  •Override existing hardcoded HTTP parameters  •Modify the application behaviors   •Access and potentially exploit uncontrollable variables  • Bypass input validation checkpoints and WAF rules HTTP Parameter Pollution – HPP   WAFs, which is the topic of interest, many times perform query string parsing before applying the filters to this string. This may result in the execution of a payload that an HTTP request can carry. Some WAFs analyze only one parameter from the string of the request, most of the times the first or the last, which may result in a bypass of the WAF filters, and execution of the payload in the server.  Let’s e

Bypassing Web Application Firewall Part - 4

Securing WAF and Conclusion DOM Based XSS DOM based XSS is another type of XSS that is also used widely, and we didn’t discuss it in module 3. The DOM, or Document Object Model, is the structural format used to represent documents in a browser. The DOM enables dynamic scripts such as JavaScript to reference components of the document such as a form field or a session cookie, and it is also a security feature that limits scripts on different domains from obtaining cookies for other domains. Now, the XSS attacks based on this is when the payload that we inject is executed as a result of modifying the DOM environment in the victim’s browser, so that the code runs in an unexpected way. By this we mean that in contrast with the other two attacks, here the page that the victim sees does not change, but the injected code is executed differently because of the modifications that have been done in the DOM environment, that we said earlier. In the other XSS attacks, we saw the injected code was