Pentest-Report Mailvelope 12.2012 - 02.2013 Cure53, Dr.-Ing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Nutzung Von Openpgp in Webanwendungen Mit Hilfe Von Erweiterungen Für Die Webbrowser Mozilla Firefox Und Google Chrome Autoren
Nutzung von OpenPGP in Webanwendungen mit Hilfe von Erweiterungen für die Webbrowser Mozilla Firefox und Google Chrome Autoren Oskar Hahn (Rechtsanwalt) Anwälte am Oberen Tor Obere Straße 30 78050 Villingen-Schwenningen http://anwaelte-am-oberen-tor.de Thomas Oberndörfer Mailvelope GmbH Schröderstr. 30/1 69120 Heidelberg https://www.mailvelope.com Unter Mitwirkung von: Bernhard Reiter Emanuel Schütze Intevation GmbH Neuer Graben 17 49074 Osnabrück https://intevation.de Werner Koch g10 code GmbH Hüttenstr. 61 40699 Erkrath https://g10code.com Dieses Werk ist unter der Lizenz „Creative Commons Namensnennung-Weitergabe unter gleichen Bedingungen Deutschland“ in Version 3.0 (abgekürzt „CC-by-sa 3.0/de“) veröffentlicht. Den rechtsverbindlichen Lizenzvertrag finden Sie unter http://creativecommons.org/licenses/by-sa/3.0/de/legalcode. Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-0 E-Mail: [email protected] Internet: https://www.bsi.bund.de © Bundesamt für Sicherheit in der Informationstechnik 2016 Änderungshistorie Version Datum Name Beschreibung 1.0 11.5.2016 siehe Autoren Initiale Version für die Veröffentlichung Inhaltsverzeichnis Inhaltsverzeichnis 1 Einleitung............................................................................................................................................................................................... 7 1.1 Ziel der Studie................................................................................................................7 1.2 -
Faster Base64 Encoding and Decoding Using AVX2 Instructions
Faster Base64 Encoding and Decoding using AVX2 Instructions WOJCIECH MUŁA, DANIEL LEMIRE, Universite´ du Quebec´ (TELUQ) Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of base64 encoding and decoding. Compared to state-of-the-art implementations, we multiply the speeds of both the encoding (≈ 10×) and the decoding (≈ 7×). We achieve these good results by using the single-instruction-multiple-data (SIMD) instructions available on recent Intel processors (AVX2). Our accelerated software abides by the specification and reports errors when encountering characters outside of the base64 set. It is available online as free software under a liberal license. CCS Concepts: •Theory of computation ! Vector / streaming algorithms; General Terms: Algorithms, Performance Additional Key Words and Phrases: Binary-to-text encoding, Vectorization, Data URI, Web Performance 1. INTRODUCTION We use base64 formats to represent arbitrary binary data as text. Base64 is part of the MIME email protocol [Linn 1993; Freed and Borenstein 1996], used to encode binary attachments. Base64 is included in the standard libraries of popular programming languages such as Java, C#, Swift, PHP, Python, Rust, JavaScript and Go. Major database systems such as Oracle and MySQL include base64 functions. On the Web, we often combine binary resources (images, videos, sounds) with text- only documents (XML, JavaScript, HTML). Before a Web page can be displayed, it is often necessary to retrieve not only the HTML document but also all of the separate binary resources it needs. -
State of End to End Encryption
What is it about Systems Reading the coee grounds State of End To End Encryption Werner Koch FSCONS 15 Gothenburg November 7, 2015 What is it about Systems Reading the coee grounds Outline What is it about Systems Reading the coee grounds What is it about Systems Reading the coee grounds What is end to end encryption I Wikipedia needs 100 words to explain E2EE. I Shorter: All data exchange between the user operated devices is encrypted and optionally integrity protected. I Needed for: Mail Chat Phone What is it about Systems Reading the coee grounds Why do we want to have this I All encryption requires a private key. I A (private) key must be protected. I Servers are other people's machines. I Servers are not trustworthy as a middleman. Solution: I Keys on a device under sole control of the user: Desktop/laptop/phone memory. Smartcard, What is it about Systems Reading the coee grounds Why do we want to have this I All encryption requires a private key. I A (private) key must be protected. I Servers are other people's machines. I Servers are not trustworthy as a middleman. Solution: I Keys on a device under sole control of the user: Desktop/laptop/phone memory. Smartcard, What is it about Systems Reading the coee grounds Why do we want to have this I All encryption requires a private key. I A (private) key must be protected. I Servers are other people's machines. I Servers are not trustworthy as a middleman. Solution: I Keys on a device under sole control of the user: Desktop/laptop/phone memory. -
Cs297report-PDF
CS297 Report Bookmarklet Builder for Offline Data Retrieval Sheetal Naidu [email protected] Advisor: Dr. Chris Pollett Department of Computer Science San Jose State University Fall 2007 Table of Contents Introduction ………………………………………………………………………………. 3 Deliverable 1 ……………………………………………………………………………... 3 Deliverable 2 ……………………………………………………………………………... 4 Deliverable 3 ……………………………………………………………………………... 6 Deliverable 4 ……………………………………………………………………………... 7 Future work ………………………………………………………………………………. 8 Conclusion ……………………………………………………………………………….. 8 References ………………………………………………………………………………... 8 2 Introduction A bookmarklet is a small computer application that is stored as a URL of a bookmark in the browser. Bookmarlet builders exist for storing single webpages in hand held devices and these webpages are stored as PDF files. The goal of my project is to develop a tool that can save entire web page applications as bookmarklets. This will enable users to use these applications even when they are not connected to the Internet. The main technology beyond Javascript needed to do this is the data: URI scheme. This enables images, Flash, applets, PDFs, etc. to be directly embedded as base64 encoded text within a web page. This URI scheme is supported by all major browsers other than Internet Explorer. Our program will obfuscate the actual resulting JavaScript so these complete applications could potentially be sold without easily being reverse engineered. The application will be made available online, to users who are typically website owners and would like to allow their users to be able to use the applications offline. This report describes the background work that was conducted as preparation for CS298 when the actual implementation of the project will take place. This preparation work was split into four main deliverables. The deliverables were designed at gaining relevant information and knowledge with respect to the main project. -
Q4 2016 Newsletter
FraudAction™ Anti-Fraud Services Q4 2016 NEWSLETTER TABLE OF CONTENTS Introduction ............................................................................................................................................ 3 The Many Schemes and Techniques of Phishing ............................................................................................... 4 The Tax Refund Ploy - Multi-branded Phishing ............................................................................................... 4 Bulk Phishing Campaigns ........................................................................................................................ 4 Random Folder Generators ...................................................................................................................... 5 Local HTML Scheme .............................................................................................................................. 6 BASE64 encoded Phishing in a URL ........................................................................................................... 7 Phishing with MITM capabilities ................................................................................................................. 7 Phishing Plus Mobile Malware in India ....................................................................................................... 10 Fast-Flux Phishing ............................................................................................................................... 13 Additional Phishing Techniques -
Analysis of Hypertext Markup Isolation Techniques for XSS Prevention
Analysis of Hypertext Isolation Techniques for XSS Prevention Mike Ter Louw Prithvi Bisht V.N. Venkatakrishnan Department of Computer Science University of Illinois at Chicago Abstract that instructs a browser to mark certain, isolated portions of an HTML document as untrusted. If robust isolation Modern websites and web applications commonly inte- facilities were supported by web browsers, policy-based grate third-party and user-generated content to enrich the constraints could be enforced over untrusted content to user’s experience. Developers of these applications are effectively prevent script injection attacks. in need of a simple way to limit the capabilities of this The draft version of HTML 5 [21] does not propose less trusted, outsourced web content and thereby protect any hypertext isolation facility, even though XSS is a long their users from cross-site scripting attacks. We summa- recognized threat and several informal solutions have re- rize several recent proposals that enable developers to iso- cently been suggested by concerned members of the web late untrusted hypertext, and could be used to define ro- development community. The main objective of this pa- bust constraint environments that are enforceable by web per is to categorize these proposals, analyze them further browsers. A comparative analysis of these proposals is and motivate the web standards and research communities presented highlighting security, legacy browser compati- to focus on the issue. bility and several other important qualities. 2 Background 1 Introduction Today’s browsers implement a default-allow policy for One hallmark of the Web 2.0 phenomenon is the rapid JavaScript in the sense they permit execution of any script increase in user-created content for web applications. -
Messageguard: Retrofitting the Web with User-To-User Encryption
MessageGuard: Retrofitting the Web with User-to-user Encryption Scott Ruoti, Daniel Zappala, Kent Seamons Brigham Young University Provo Utah, USA [email protected], [email protected], [email protected] ABSTRACT third-party libraries [34], compromise of the website's back Users today share a great deal of private information on the end, poor protocol design and implementation [12], and co- Web. While HTTPS protects this data during transmission, erced information disclosure by governments. it does not protect data at rest, nor does it protect user data This state of affairs motivates the need for user-to-user from the websites which store or transmit that data. These encryption, an approach in which data is encrypted and de- issues can be addressed with user-to-user encryption, an ap- crypted at each user's computer and is opaque to the web- proach where data is encrypted and decrypted at the user's sites that store or transmit this data. There are many use computer and is opaque to websites. In this paper we present cases for user-to-user encryption. For example, two users MessageGuard, the first system that retrofits the Web with can encrypt their email, preventing either of their email user-to-user encryption and is designed to work with all web- providers from accessing its contents. Similarly, users may sites, in all browsers, on all platforms. We demonstrate that want to encrypt sensitive files shared through DropBox or MessageGuard operates out-of-the-box on 47 of the Alexa Google Drive. In some cases, a user may wish to be the only top 50 sites, has minimal performance overhead, and is rated endpoint, such as when storing private items in a Web-based as highly usable by study participants. -
Efail: Breaking S/MIME and Openpgp Email Encryption Using Exfiltration Channels
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Damian Poddebniak and Christian Dresen, Münster University of Applied Sciences; Jens Müller, Ruhr University Bochum; Fabian Ising and Sebastian Schinzel, Münster University of Applied Sciences; Simon Friedberger, NXP Semiconductors, Belgium; Juraj Somorovsky and Jörg Schwenk, Ruhr University Bochum https://www.usenix.org/conference/usenixsecurity18/presentation/poddebniak This paper is included in the Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA ISBN 978-1-939133-04-5 Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Damian Poddebniak1, Christian Dresen1, Jens Muller¨ 2, Fabian Ising1, Sebastian Schinzel1, Simon Friedberger3, Juraj Somorovsky2, and Jorg¨ Schwenk2 1Munster¨ University of Applied Sciences 2Ruhr University Bochum 3NXP Semiconductors, Belgium Abstract is designed to protect user data in such scenarios. With end-to-end encryption, the email infrastructure becomes OpenPGP and S/MIME are the two prime standards merely a transportation service for opaque email data and for providing end-to-end security for emails. We de- no compromise – aside from the endpoints of sender or scribe novel attacks built upon a technique we call mal- receiver – should affect the security of an end-to-end en- leability gadgets to reveal the plaintext of encrypted crypted email. emails. We use CBC/CFB gadgets to inject malicious plaintext snippets into encrypted emails. These snippets S/MIME and OpenPGP. The two most prominent stan- abuse existing and standard conforming backchannels to dards offering end-to-end encryption for email, S/MIME exfiltrate the full plaintext after decryption. -
Bewertung Der GMX/Mailvelope-Ende- Zu-Ende-Verschlüsselung
Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer Bewertung der GMX/Mailvelope-Ende- zu-Ende-Verschlüsselung Ende-zu-Ende-verschlüsselte E-Mail-Kommunikation gewinnt in Anbetracht aktueller Geschehnisse erneut an Relevanz. Obwohl die entsprechenden Möglichkeiten seit mehr als zwei Jahrzehnten gegeben sind, bleiben die technischen Umsetzungen Endanwendern häufig unzugänglich. Ein wesentlicher Grund dafür ist die Benutzbarkeit dieser Umsetzungen wie frühere Studien belegen. Ein Schritt wird derzeit von den Anbietern GMX und WEB.DE in Zusammenarbeit mit Mailvelope unternommen, Ende-zu-Ende-verschlüsselte E-Mail- Kommunikation in den gewohnten Benutzerschnittstellen der E-Mail-Anbieter zu ermöglichen. Zur Bewertung dieses Ansatzes wurde im Rahmen dieser Arbeit ein Cognitive Walkthrough durchgeführt. Darüber hinaus wurde die Sicherheit des Ansatzes bewertet. Die Ergebnisse dieser Arbeit sollen als Grundlage zukünftiger Entwicklungen dienen. 1 Einleitung wird insbesondere der aus Nutzersicht kritische Schlüssel- austausch und die Sicherung der Schlüsseldaten über die In- Eine der bedeutendsten digitalen Kommunikationskanäle tegration von Mailvelope in die bestehende Infrastruktur stellt die E-Mail dar; über 80% der Deutschen nutzen das In- der E-Mail-Anbieter vereinfacht. Dieser Schritt der E-Mail- ternet zum Versenden und Empfangen von E-Mails1, Ten- Anbieter könnte zukünftig Nutzern den Weg zur E2E-Ver- denz steigend. Nicht zuletzt die Snowden-Enthüllungen ha- schlüsselung ihrer E-Mail-Kommunikation erleichtern. ben der Allgemeinheit die technischen Möglichkeiten zur di- Ziel dieser Arbeit ist die Bewertung der Integration der gitalen Massenüberwachung aufgezeigt und zahlreiche Fra- Browsererweiterung Mailvelope in die bestehende Infra- gen zur Sicherheit und Privatsphäre digitaler Kommunika- struktur des E-Mail-Anbieters GMX aus Sicht der „benutzba- tion aufgeworfen. Ziel kryptographischer Ansätze ist die E- ren Sicherheit“. -
Describing Data Patterns. a General Deconstruction of Metadata Standards
Describing Data Patterns A general deconstruction of metadata standards Dissertation in support of the degree of Doctor philosophiae (Dr. phil.) by Jakob Voß submitted at January 7th 2013 defended at May 31st 2013 at the Faculty of Philosophy I Humboldt-University Berlin Berlin School of Library and Information Science Reviewer: Prof. Dr. Stefan Gradman Prof. Dr. Felix Sasaki Prof. William Honig, PhD This document is licensed under the terms of the Creative Commons Attribution- ShareAlike license (CC-BY-SA). Feel free to reuse any parts of it as long as attribution is given to Jakob Voß and the result is licensed under CC-BY-SA as well. The full source code of this document, its variants and corrections are available at https://github.com/jakobib/phdthesis2013. Selected parts and additional content are made available at http://aboutdata.org A digital copy of this thesis (with same pagination but larger margins to fit A4 paper format) is archived at http://edoc.hu-berlin.de/. A printed version is published through CreateSpace and available by Amazon and selected distributors. ISBN-13: 978-1-4909-3186-9 ISBN-10: 1-4909-3186-4 Cover: the Arecibo message, sent into empty space in 1974 (image CC-BY-SA Arne Nordmann, http://commons.wikimedia.org/wiki/File:Arecibo_message.svg) CC-BY-SA by Widder (2010) Abstract Many methods, technologies, standards, and languages exist to structure and de- scribe data. The aim of this thesis is to find common features in these methods to determine how data is actually structured and described. Existing studies are limited to notions of data as recorded observations and facts, or they require given structures to build on, such as the concept of a record or the concept of a schema. -
Dynamic Web-Applications with Meteor.Js
Yrkkö Äkkijyrkkä Dynamic Web-Applications with Meteor.js Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Thesis 4 December 2015 Abstract Author(s) Yrkkö Äkkijyrkkä Title Dynamic Web-Applications with Meteor.js Number of Pages 36 pages Date December 4, 2015 Degree Bachelor of Engineering Degree Programme Information Technology Specialisation option Software engineering Instructor(s) Simo Silander, Senior Lecturer This thesis studies the viability of using Meteor.js in implementing a content management system by using the User Centred Design and Generic programming paradigm. The goal of the project was to program generic visual templates and software modules to be used in the aggregation and displaying of user-created data. The need for a content management system came from Aalto University Department of Ar- chitecture, which was in dire need for a more accessible way of interacting with their audi- ence and the academic community. During the development a great deal of care was placed on making the intranet side acces- sible to different user profiles, the common factor being the fact that the user base is stems from the architecture department or similar academic circles. The author’s knowledge and experience gained during studies and working as a freelance web-developer during the past 5 years were well applied in the project, as well as the know- how acquired at Conmio Oy building high concurrency web-applications that once served up to 100 million page hits per day. Within this frame work, the study tries to objectively ascertain how production-ready Meteor actually is, how flexible it is when considering a particular software design and how well it performs when carrying out the design. -
A Secure Searcher for End-To-End Encrypted Email Communication
A secure searcher for end-to-end encrypted email communication Balamaruthu Mani Dissertation 2015 Erasmus Mundus MSc in Dependable Software Systems Department of Computer Science National University of Ireland, Maynooth Co. Kildare, Ireland A dissertation submitted in partial fulfilment of the requirements for the Erasmus Mundus MSc Dependable Software Systems Head of Department: Dr Adam Winstanley Supervisor: Professor Barak A. Pearlmutter 8-June-2015 Word Count: 19469 1 Abstract Email has become a common mode of communication for confidential personal as well as business needs. There are different approaches to authenticate the sender of an email message at the receiver‟s client and ensure that the message can be read only by the intended recipient. A typical approach is to use an email encryption standard to encrypt the message on the sender‟s client and decrypt it on the receiver‟s client for secure communication. A major drawback of this approach is that only the encrypted email messages are stored in the mail servers and the default search does not work on encrypted data. This project details an approach that could be adopted for securely searching email messages protected using end-to-end encrypted email communication. This project proposes an overall design for securely searching encrypted email messages and provides an implementation in Java based on a cryptographically secure Bloom filter technique to create a secure index. The implemented library is then integrated with an open source email client to depict its usability in a live environment. The technique and the implemented library are further evaluated for security and scalability while allowing remote storage of the created secure index.