elhacker.net cabecera Bienvenido(a), Visitante. Por favor Ingresar o Registrarse
¿Perdiste tu email de activación?.

 

 


Tema destacado: Arreglado, de nuevo, el registro del warzone (wargame) de EHN


+  Foro de elhacker.net
|-+  Seguridad Informática
| |-+  Hacking (Moderador: toxeek)
| | |-+  QRCode Attack Vector
0 Usuarios y 1 Visitante están viendo este tema.
Páginas: [1] Ir Abajo Respuesta Imprimir
Autor Tema: QRCode Attack Vector  (Leído 4,389 veces)
jpmo4


Desconectado Desconectado

Mensajes: 1.579


Aproximadamente en........................


Ver Perfil
QRCode Attack Vector
« en: 18 Abril 2012, 03:23 am »

Hola compis, encontre un muy buen material para echarle un vistazo. No es de mi Autoria, solo copie y pegue lo de la Web PentestLab. Gracias al amigo @netbiosX.

Espero les sea de utilidad

In nowadays QR codes are almost everywhere.You can see them in every product,in concert tickets even in advertisements on the streets.The main purpose of these QR Codes is to be used for marketing purposes or for people who would like to know more information about a specific product or service.However this wide use of QR codes can be an extra advantage for hackers and ethical penetration testers.Hackers they can use this QR codes in order to attack unsuspicious users and penetration testers can include this type of attack in their social engineering engagements.In this article we will examine this type of attack.

If you are conducting a penetration test and you want to include this type of attack the implementation is a very easy process.Of course there are many ways and combinations that you can try with this attack vector but in this article we will see how we can use the QR code to harvest credentials.The first thing that you will need is the fake website.So we will use the Social Engineering Toolkit to create that.Of course from the menu we will select the option 2 which is the Website Attack Vectors.

Seleccionar Website Attack Vector

We need to harvest credentials so from the next menu we will choose the Credential Harvester Attack Method.

Seleccionamos Credential Harvester Attack

We will select from the existing templates to clone Facebook.

Seleccionamos el Template de Facebook

So we are cloning the website and then we are ready to wait for users that would insert their credentials.



Now its time to focus on the creation of the QR Code that would redirect the users to our fake website.There are many websites available on the Internet that allows you to create QR Codes but the Social Engineering Toolkit can also generate a QR Code for us.The process is very easy we just selecting the option 9 which is the QRCode Generator Attack Vector.

Seleccionamos QRCode Generator Attack Vector

SET will ask for a URL that will redirect the users that will scan this QR Code.We will use as the URL our IP address because we have set up the listener in this address.


There are many ways that you can deliver a QR Code to users but lets say that you want to send it via emails into your client’s employee’s.The way that you will introduce this QR Code to the employee’s it’s up to the penetration tester but lets say that you found a new Facebook application that requires to scan this in order to win some points.The unsuspicious users when will open their mails will see an image that will look like this:

QR Malicioso

The users that will scan this QR Code with their mobiles phones they will redirected to the fake website which in our case is Facebook.If they put their credentials then it will appear to your system.

Obteniendo Credenciales

Conclusion:

Curiosity is the biggest problem here.Many people would scan an unknown QR code with their mobile phones just because they want to know more.In many cases malicious users are using this type of attack in order to deliver malicious links not only for harvesting credentials but also for delivering malware and viruses to the mobile phones of the unsuspicious users.

We can say that the QR codes are in way the carriers that are storing the malicious links.It is an image that you don’t know what it contains and you cannot decode it unless you have a scan reader.There are ways also that an attacker could modify a valid QR Code in order to redirect traffic to a malicious website.Users cannot verify of course that the QR Code has modified so they will probably think that the link is valid.Because of the format of that attack QR Codes can create a huge risk for any user.


Como dije, solo copie y pegue el tuto de netbiosX, se que esta en Ingles,pero es muy facil entender lo que aqui se esta haciendo.

Salu2 compis



En línea

Podras llevarme a mi novia, incluso hasta a mi perro, pero a mi computadora... jamas

   
Stakewinner00


Desconectado Desconectado

Mensajes: 1.426



Ver Perfil WWW
Re: QRCode Attack Vector
« Respuesta #1 en: 6 Junio 2012, 21:43 pm »

esto de los QrCode no los e usado nunca. Pero por lo que veo cada vez son mas famossos
En línea

Páginas: [1] Ir Arriba Respuesta Imprimir 

Ir a:  

Mensajes similares
Asunto Iniciado por Respuestas Vistas Último mensaje
Black Netbios Attack
Abril negro
cheatmaster 7 9,041 Último mensaje 29 Abril 2009, 00:22 am
por Mad Antrax
Anatomy of xss attack
Nivel Web
kamsky 6 5,299 Último mensaje 11 Enero 2010, 02:17 am
por WHK
SET - Wireless Access Point Attack Vector
Wireless en Linux
Cr4id3r 0 7,106 Último mensaje 18 Abril 2013, 22:50 pm
por Cr4id3r
Dragonblood attack && KRACK
Hacking Wireless
anXORdead 0 2,766 Último mensaje 31 Marzo 2021, 04:46 am
por anXORdead
WAP2 - Aviso Legal - Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines