Browser History Stealing with Captive Wi-Fi Portals

Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, E. Weippl
{"title":"Browser History Stealing with Captive Wi-Fi Portals","authors":"Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, E. Weippl","doi":"10.1109/SPW.2016.42","DOIUrl":null,"url":null,"abstract":"In this paper we show that HSTS headers and long-term cookies (like those used for user tracking) are so prevailing that they allow a malicious Wi-Fi operator to gain significant knowledge about the past browsing history of users. We demonstrate how to combine both into a history stealing attack by including specially crafted references into a captive portal or by injecting them into legitimate HTTP traffic. Captive portals are used on many Wi-Fi Internet hotspots to display the user a message, like a login page or an acceptable use policy before they are connected to the Internet. They are typically found in public places such as airports, train stations, or restaurants. Such systems have been known to be troublesome for many reasons. In this paper we show how a malicious operator can not only gain knowledge about the current Internet session, but also about the user's past. By invisibly placing vast amounts of specially crafted references into these portal pages, we can lure the browser into revealing a user's browsing history by either reading stored persistent (long-term) cookies or evaluating responses for previously set HSTS headers. An occurrence of a persistent cookie, as well as a direct call to the pages' HTTPS site is a reliable sign of the user having visited this site earlier. Thus, this technique allows for a site-based history stealing, similar to the famous link-color history attacks. For the Alexa Top 1,000 sites, between 82% and 92% of sites are effected as they use persistent cookies over HTTP. For the Alexa Top 200,000 we determined the number of vulnerable sites between 59% and 86%. We extended our implementation of this attack by other privacy-invading attacks that enrich the collected data with additional personal information.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Security and Privacy Workshops (SPW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPW.2016.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

In this paper we show that HSTS headers and long-term cookies (like those used for user tracking) are so prevailing that they allow a malicious Wi-Fi operator to gain significant knowledge about the past browsing history of users. We demonstrate how to combine both into a history stealing attack by including specially crafted references into a captive portal or by injecting them into legitimate HTTP traffic. Captive portals are used on many Wi-Fi Internet hotspots to display the user a message, like a login page or an acceptable use policy before they are connected to the Internet. They are typically found in public places such as airports, train stations, or restaurants. Such systems have been known to be troublesome for many reasons. In this paper we show how a malicious operator can not only gain knowledge about the current Internet session, but also about the user's past. By invisibly placing vast amounts of specially crafted references into these portal pages, we can lure the browser into revealing a user's browsing history by either reading stored persistent (long-term) cookies or evaluating responses for previously set HSTS headers. An occurrence of a persistent cookie, as well as a direct call to the pages' HTTPS site is a reliable sign of the user having visited this site earlier. Thus, this technique allows for a site-based history stealing, similar to the famous link-color history attacks. For the Alexa Top 1,000 sites, between 82% and 92% of sites are effected as they use persistent cookies over HTTP. For the Alexa Top 200,000 we determined the number of vulnerable sites between 59% and 86%. We extended our implementation of this attack by other privacy-invading attacks that enrich the collected data with additional personal information.
通过强制Wi-Fi门户窃取浏览器历史记录
在本文中,我们展示了HSTS标头和长期cookie(如用于用户跟踪的那些)是如此普遍,以至于它们允许恶意的Wi-Fi运营商获得关于用户过去浏览历史的重要知识。我们将演示如何将这两种方法结合到历史窃取攻击中,方法是将特制的引用包含到强制门户中,或者将它们注入到合法的HTTP流量中。强制门户在许多Wi-Fi Internet热点上用于在用户连接到Internet之前向用户显示消息,如登录页面或可接受的使用策略。它们通常出现在公共场所,如机场、火车站或餐馆。由于许多原因,这种系统已经被认为是麻烦的。在本文中,我们展示了一个恶意的操作员如何不仅可以获得当前的互联网会话的知识,还可以获得用户的过去。通过在这些门户页面中不可见地放置大量精心制作的引用,我们可以通过读取存储的持久(长期)cookie或评估对先前设置的HSTS标头的响应来诱使浏览器揭示用户的浏览历史。持久cookie的出现以及对页面HTTPS站点的直接调用是用户早些时候访问过该站点的可靠标志。因此,这种技术允许基于站点的历史记录窃取,类似于著名的链接颜色历史记录攻击。对于Alexa排名前1000的网站,82%到92%的网站受到影响,因为他们在HTTP上使用持久cookie。对于Alexa排名前20万的网站,我们确定易受攻击的网站数量在59%到86%之间。我们通过其他侵犯隐私的攻击扩展了这种攻击的实现,这些攻击使用额外的个人信息来丰富收集的数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信