No video

Rob Fuller Shows Us Weaknesses With Mailvelope, Hak5 1417.3

  Рет қаралды 9,210

Hak5

Hak5

Күн бұрын

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Rob Fuller Shows Us Weaknesses With Mailvelope
Darren talks with Mubix of www.room362.com about the issues with browser plug-in based email encryption.
Hak5 1417.1: • HackRF update with Jar...
Hak5 1417.2: • Interview with Lee Fel...
Hak5 1417.3: • Rob Fuller Shows Us We...
~-~~-~~~-~~-~
Please watch: "Bash Bunny Primer - Hak5 2225"
• Bash Bunny Primer - Ha...
~-~~-~~~-~~-~
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Пікірлер: 28
@srider33
@srider33 9 жыл бұрын
To clarify as others have stated, even if someone gets your private key in mailvelope, they can't read your mail unless they crack your passphrase. If a sophisticated government entity like the NSA seized your key, and your passphrase was under 12 characters (give or take), it can probably be cracked within a couple days (according to Snowden in "Citizen 4"). If someone less sophisticated got your private key (i.e. your boss/family member/nosy neighbor) there is little they could do with it. Unless you're up to some serious espionage, it's pretty unlikely you'll use Mailvelope and find that it was inadequate for protecting the content of your messages.
@jeffchapman8992
@jeffchapman8992 9 жыл бұрын
On June 12, 2015, this video will be two years old. Allow me to ask, WHAT is the current 'better' approach than using this Chrome extension and version of mailvelope? Has this exploit - access to the private key by a smart guy like Rob - been resolved? Frankly I believe that a Chrome extension would be more likely than not to just simply (quietly, secretly, illegally?) 'hand over the keys' to Pentagon/GCHQ/5Eyes as part of the whole surveillance entitlement attitude that they have in order to - ahem - protect us against evils. What should a guy use to encrypt (without backdoor access). PS this mailvelope encryption 'tool' didn't download as a Firefox extension ... and that has me equally leery now.
@mutoso0
@mutoso0 11 жыл бұрын
You're right. That means that you'll need a strong passphrase to defend your PGP key against someone having access to your box, physical or remote.
@nicolasmagee1780
@nicolasmagee1780 9 жыл бұрын
So... Where exactly should a plug-in store the sensitive data? I mean, it has to store the passwords somewhere. Even if you encrypt the keys you generate another key to remember in a never ending key chain. So what's all this "in plain text" thing?
@madlogik
@madlogik 10 жыл бұрын
I also noticed mailvelope for instance only stores the private keys if you have a private / public pair ... when you look in the openpgp-public-keys in the sqlite file you only have the public keys for email that you don't have the private one. (logic I know now, but before I learned about pgp thanks to hak5's videos, I always thought I needed to import both my public and private keys :P ahhh technology ... btw Darren: -----BEGIN PGP MESSAGE----- Version: GnuPG v1 hQIMA+BZPuCxO7TAAQ//SeNBXj0F/4vjI9chBd+kV/M1w596uXixuw9XvtZ/uCf6 zy3ssLc07y1h3k4+8043QE13sxlEMKtHK1LuPtISr2UNtjBjzS8tWN8hPUoQB9HL CdnhyU83HM7YAIatiKgF/zBRFowyWp+qEsJsbzRL+hO35yW8w++Zao3boGFY3ESg 94H3qf1f4OFe1StXyfgAAnJs9UqpYSd/hOGoxOokfmkB2ee4LzWw2hDZZ9FoZktg a7WPPveRJXiTNdJZVpQjAq2Vw8Q2ExY4CVqqSUqyapI6qMWVccFj9jLp/z2T/9rT AU0z2sT6D2VnykRj1mK5h9huN0f7rax5RCnSnu+oS902qRM9jdDrym0jlDSyWScn GwD07KRX5dsPatw9t0gjICH6SxapxdplvHv31iLWucrFs38mzbavyq7jFH+0ig79 G2+7q3V7/709ArJY32ZAfz9P7Xv/eM7Qfd9D/qykjQ9+ICumMydzm5px83CCfGyz d8q4ryX/SVv9un990rmddEMNGivgmH4ZGyzPGnQoj/GsjqbP10xUVDFUTWgz6iM3 HFJf+pp+Svyh5L+TgisnWMbNqdEsdfX+B425L8lnbINsG2YCrfMYGp3kFLT88/31 LnVCyhAyFKaK4O+iVdXFwAPAiRPE2nrx9kNZl6zWXELbnoLpmcrSJwZS6FtYhLfJ wAEcm8D31iTVftKkhbFZfOIiHQ3dpIESSD/wMI+CeQHJLHK6Xa/mywRWVgmtGpBs XiXlISNXNAdEpcCU+jXHLY1Lygi/xS3gzWyYAuALf61IGQvvu0mQOif9vnE4OXJP uwsorgvPfZPj2zpDra1uzupmk9sEzD87CVy0Ht7U9K4NbI8NYda/yBi+3r8k5014 paYNc3MzYQBTY/++Zr7p9Nj4gBLAUK5Z78gjzzlMxsGkgeBPFC7vwleIb+UPWn9n bSoS =8GRR -----END PGP MESSAGE-----
@tannewton
@tannewton 8 жыл бұрын
I think I would still recommend MailVelope, and just hope that not many malicious people are as smart as Rob Fuller. I also agree with Darren Kitchen that MailVelope actually does a good job. After all, private keys have to be stored somewhere. So, of course, someone who makes every endeavour to find the private keys will eventually find them.
@blackboxdisease
@blackboxdisease 9 жыл бұрын
I'm pretty sure extensions can't communicate with each other and unless there is a back door, a person has a better chance at winning the top payout of a lottery than having their private key stolen.
@lelandweathers4749
@lelandweathers4749 11 жыл бұрын
The private key is not in plain text. You did use a strong pass phrase didnt you? That is the key for the symmetric encryption of the private key. If you used a blank password true the key is unencrypted. This attack is no worse than having any implementation of encryption on your system. There is always a key somewhere that you can pull of you own the box. Put the attack into perspective, you still have to brute force the encryption. Go read the gnupg docs on protecting the private key.
@former_member
@former_member 11 жыл бұрын
Well thankyou for replying to my email Thomas, I will stay tuned for updates.
@patrickerhiakporeh8291
@patrickerhiakporeh8291 8 жыл бұрын
I am not surprise, I have argued before that as long as our private key still store in our system we are vulnerable. But the risk is very remote to ordinary users.
@Topbitcoinexchanges
@Topbitcoinexchanges 9 жыл бұрын
it's still encrypted, but the private key is in "plain text" that it can be accessed IF YOU HAVE THE PASSWORD. so relax
@darkpowerxo
@darkpowerxo 11 жыл бұрын
@rob fuller, what is your screen recorder program?
@darkpowerxo
@darkpowerxo 11 жыл бұрын
now i'm using adobe and microsoft stuff, for every single feature they charge you 1000 looking for a good screen capture+live streem webcam+audio that works on windows and linux(ubuntu or debian based)
@gte911
@gte911 10 жыл бұрын
Yes the local storage file contains the private key but this is useless without the passphrase ? However, the file contains also the "Security Token" (see concept: www.mailvelope.com/help) which is supposed to help the user in detecting an attempt to fake the plugin page and to steal his passphrase. So, could an attack scenario involve someone: 1) Getting access to target's filesystem to retrieve passphrase + security token 2) Sending phishing mail to the target, faking plugin interface + security token 3) Successfully getting the passphrase from the target 4) Being able to spoof identity of target and decipher his mails ?
@demiurgetheartisan
@demiurgetheartisan 11 жыл бұрын
ok. so what your saying is using the PK is worth ZERO?
@KenTenTen
@KenTenTen 11 жыл бұрын
Sorry, this doesn't pass the "So what?" test. Of course, one should protect the private key, but that's just good physical security. Any local attack, including stealing your PC, will achieve the same goal--the bad guy has your private key. That's why you protect your private key with a non-trivial password...and that's the way it is in the real world.
@SamJones1337
@SamJones1337 11 жыл бұрын
Pardon my ignorance, but don't you still need the passphrase and the private key to impersonate someone.
@TomasOBrien
@TomasOBrien 10 жыл бұрын
Wow 6 months and the vuln hasnt been fixed. This could be fun.
@thomasb1337
@thomasb1337 11 жыл бұрын
Luckily I use an openpgp card to encrypt my mail. So, my private is nowhere on my system.
@Borian
@Borian 11 жыл бұрын
Mailvelope did a security audit, they had a post on their blog mailvelope. com/blog/security-audit-and-v0.6-release) here is the report : cure53. de/pentest-report_mailvelope.pdf so I think they are actively working on security if they have suggestions.
@Shackleford_Rusty
@Shackleford_Rusty 11 жыл бұрын
cant wait to kick it on the 22nd Darren
@Boodieman72
@Boodieman72 11 жыл бұрын
No big deal, if someone has access to your computer you have bigger problems. Use whole disk encryption.
@whatseems
@whatseems 11 жыл бұрын
Why are you calling him Rob Fuller? Mubix for the win.
@darkpowerxo
@darkpowerxo 11 жыл бұрын
i was building my own python script for that but it's already in msf?! awesome!
@darkpowerxo
@darkpowerxo 11 жыл бұрын
thanks
@50red510
@50red510 11 жыл бұрын
Try using "xsplit"
@AlansvideoAccount
@AlansvideoAccount 9 жыл бұрын
The 'Cure53' review is a looong way down -- github.com/mailvelope/mailvelope/blob/master/Changelog.md
@50red510
@50red510 11 жыл бұрын
Gotomeeting
Email Encryption for Everyone - Hak5 1410.1
23:56
Hak5
Рет қаралды 58 М.
Find Almost Anything Online At Defcon 21, Hak5 1425.2
15:33
If Barbie came to life! 💝
00:37
Meow-some! Reacts
Рет қаралды 78 МЛН
Мы сделали гигантские сухарики!  #большаяеда
00:44
Apple’s Accidental Stalkerware - ThreatWire
7:21
Hak5
Рет қаралды 25 М.
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
12:47
John Hammond
Рет қаралды 1 МЛН
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
1407.3, Announcing Hack Across America
16:22
Hak5
Рет қаралды 6 М.
Detect Hackers & Malware on your Computer (literally for free)
16:38
Why VPNs are a WASTE of Your Money (usually…)
14:40
Cyberspatial
Рет қаралды 1,5 МЛН
If Barbie came to life! 💝
00:37
Meow-some! Reacts
Рет қаралды 78 МЛН