الثلاثاء، 25 أغسطس 2020

Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/
More articles

BeEF: Browser Exploitation Framework


"BeEF is the browser exploitation framework. A professional tool to demonstrate the real-time impact of XSS browser vulnerabilities. Development has focused on creating a modular structure making new module development a trivial process with the intelligence residing within BeEF. Current modules include the first public Inter-protocol Exploit, a traditional browser overflow exploit, port scanning, keylogging, clipboard theft and more." read more...


Website: http://www.bindshell.net/tools/beef


More information

  1. Hacking Tools Mac
  2. Pentest Tools Subdomain
  3. Hacking Tools Usb
  4. Top Pentest Tools
  5. Hack Tool Apk
  6. Hacking Tools For Windows Free Download
  7. New Hack Tools
  8. How To Make Hacking Tools
  9. Pentest Tools Github
  10. Hacking Tools Kit
  11. Computer Hacker
  12. Hack Tools Mac
  13. Hacker Tools 2019
  14. Hacker Tools List
  15. Pentest Tools Windows
  16. Hacker Tools Free Download
  17. Hacking Tools Usb
  18. Hacking Tools
  19. Hack Rom Tools
  20. Easy Hack Tools
  21. Termux Hacking Tools 2019
  22. What Are Hacking Tools
  23. Hack Tool Apk
  24. Nsa Hacker Tools
  25. Hack Rom Tools
  26. Pentest Tools For Android
  27. Pentest Tools Alternative
  28. Hack Tools Online
  29. Pentest Tools Website
  30. Hacker Tools Software
  31. Pentest Tools Linux
  32. Hacking Tools Mac
  33. How To Install Pentest Tools In Ubuntu
  34. Hacking Tools Name
  35. Hacking Tools 2020
  36. Hacker Tools Free Download
  37. Hacking Tools For Games
  38. Pentest Tools For Android
  39. Pentest Tools Framework
  40. Hacking Tools Hardware
  41. Hack Tools For Mac
  42. Ethical Hacker Tools
  43. Pentest Tools Kali Linux
  44. Hack Tools Mac
  45. Pentest Tools Website
  46. Hacker Tools Apk Download
  47. Pentest Tools Tcp Port Scanner
  48. Hackers Toolbox
  49. Hacking Tools Online
  50. Hacker Tools For Ios
  51. Hacking Tools
  52. Growth Hacker Tools
  53. Best Hacking Tools 2019
  54. Hacker Tools Mac
  55. Hack App
  56. Hacking Tools 2019
  57. Pentest Tools Download
  58. Hacking App
  59. Pentest Tools Download
  60. Hacking Tools For Games
  61. Hacker Tools 2020
  62. Hacking Tools For Windows 7
  63. Install Pentest Tools Ubuntu
  64. Best Hacking Tools 2019
  65. Hacking Tools For Windows Free Download
  66. Hak5 Tools
  67. Hacking Tools For Windows 7
  68. Hacking Tools Download
  69. Hacker Tools 2019
  70. Pentest Tools Framework
  71. Hacker Tools Hardware
  72. Hacker Tools Hardware
  73. Hacker Hardware Tools
  74. Top Pentest Tools
  75. Hak5 Tools
  76. Hack App
  77. Easy Hack Tools
  78. Hacker Tools List
  79. Hacking Tools For Kali Linux
  80. Hacking Tools Free Download
  81. Hacking Tools Hardware
  82. Hacking Tools Kit
  83. Hak5 Tools
  84. Tools For Hacker
  85. Pentest Tools Github
  86. Hacking Tools For Mac
  87. Pentest Tools Online
  88. Hack Tools For Windows
  89. Ethical Hacker Tools
  90. Hacking Tools For Games
  91. Hacker Tools Github
  92. Hack Tools Online
  93. Hacking Tools 2020
  94. Hacking Tools
  95. Top Pentest Tools
  96. Hacker Techniques Tools And Incident Handling
  97. How To Hack
  98. Pentest Tools Port Scanner
  99. Hacking Tools For Kali Linux
  100. Physical Pentest Tools
  101. Hackrf Tools
  102. Hacking Tools For Games
  103. Hacking Apps
  104. Hacker Security Tools
  105. Hackers Toolbox
  106. Hacking Tools Hardware
  107. Hacking Tools Download
  108. Pentest Tools For Ubuntu
  109. Hacker Tools Online
  110. Hack Website Online Tool
  111. Hack Tools Mac
  112. Hack Tools For Games
  113. Pentest Tools Open Source
  114. Hack Rom Tools
  115. Best Hacking Tools 2020
  116. Growth Hacker Tools
  117. Hack Tools For Pc
  118. Hacker Search Tools
  119. Pentest Tools Find Subdomains
  120. Hacker Tool Kit
  121. New Hacker Tools
  122. Hacking Tools Windows
  123. Underground Hacker Sites
  124. Physical Pentest Tools
  125. Pentest Tools Website Vulnerability
  126. Hacking Tools For Pc
  127. Hacker Tools For Mac
  128. Hacking Tools For Games
  129. Hacking Tools Kit
  130. Hacking Tools For Windows 7
  131. Physical Pentest Tools
  132. Hacker Tools
  133. Black Hat Hacker Tools
  134. Pentest Tools Subdomain
  135. Hacking Tools For Games
  136. Hacker Tools For Ios
  137. Hacking Tools Name
  138. Hack Tools Download
  139. Hack Tools For Games
  140. Pentest Tools Framework
  141. Github Hacking Tools
  142. Hacker Tools For Mac
  143. Hacker Tools Mac
  144. Hacking Tools Hardware
  145. Hack Tools 2019

HaCode - FUD Backdoor Generator / Remote Administration Tool

More articles