Tuesday 5 May 2015

Skype vulnerable to "Redirect to SMB"

Skype vulnerable to "Redirect to SMB"

Skype has discovered to be vulnerable via redirecting to SMB from within its ads interface.As Skype uses Internet Explorer to display ads, a malicious attacker can redirect you unwittingly to SMB. Redirect to SMB is a way for attackers to steal valuable user credentials by hijacking communications with legitimate web servers via man in the middle attacks, then sending them to malicious SMB servers that force them to split out the victim username, domain and password.

The best way to protect yourself from this vulnerability is to block ad serving from Skype ad servers. yo can block these servers by appending the following to your host file,
  1. 127.0.0.1 rad.msn.com
  2. 127.0.0.1 live.rads.msn.com
  3. 127.0.0.1 ads1.msn.com
  4. 127.0.0.1 static.2mdn.net
  5. 127.0.0.1 g.msn.com
  6. 127.0.0.1 a.ads2.msads.net
  7. 127.0.0.1 b.ads2.msads.net
  8. 127.0.0.1 ac3.msn.com

No comments:

Post a Comment

Prevention Techniques: Cross-site request forgery (CSRF)

1. The best defense against CSRF attacks is unpredictable tokens, a piece of data that the server can use to validate the request, and wh...