Paper Title:
A Network Forensics System Bypassing Web Local Encryption Businesses
  Abstract

Sniffer and MITM attack can do nothing to local encryption, which is a new technology, because the plaintext is merely encrypted in user’s browser. Therefore, this paper proposed a clever way to bypass local encryption to achieve the goal of network forensics, based on the idea of MITM attack. A middle device is added to the key point of the network in which the forensics is realized through hijacking and tampering with HTML pages. The system redirects the IP packet to another computer in LAN by hijacking the real IP of the server. That computer fakes the real web server, and then by inserting some code in HTML page, the unencrypted plaintext is got before the code of local encryption been executed. The results show that the object is not aware of the existence of the forensics system, but the system has logged all the information of a HTTP request, including the plaintext bypassed local encryption.

  Info
Periodical
Key Engineering Materials (Volumes 426-427)
Edited by
Dunwen Zuo, Hun Guo, Guoxing Tang, Weidong Jin, Chunjie Liu and Chun Su
Pages
494-498
DOI
10.4028/www.scientific.net/KEM.426-427.494
Citation
P. Li, R.Z. Wang, Y.Z. Zhang, D.W. Chen, "A Network Forensics System Bypassing Web Local Encryption Businesses", Key Engineering Materials, Vols. 426-427, pp. 494-498, 2010
Online since
January 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wei Wang, Fei Xu, Jun Yin
Chapter 15: New Mechanisms and Robotics
Abstract:Partial reconfiguration of FPGAs requires loading partial bitstream. But loading a faulty or corrupted partial bitstream might cause some...
2424
Authors: Chun Ying Gu, Rui Ying Fang
Chapter 6: Communication and Network
Abstract:Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide...
1075
Authors: Yu Xin Meng, Jun Yu Dong, Yan Hua Yin, Lin Qi
Chapter 1: Engineering Science for Manufacturing
Abstract:This paper reports the work of designing a filter driver in the System kernel layer using the Minifilter technique to implement transparent...
323
Authors: Wang Bin, Chong Ran Jiang, Jing Li
Chapter 3: Network and Computer Technology. Applied Methods of Computing
Abstract:The paper designs a hard disk encryption system with pure software realization, the system uses the Windows driver development technology,...
172
Authors: Hong Liang Li, Li Fu Li, Yu Wang
Chapter 6: Computer Science, Networks, Communication, Software, Information Security and Technologies
Abstract:PoC is an instant communication service based on cellular network, which can transmit information of voice by VoIP. In order to increase the...
935