Overview
Syllabus
Intro
Traditional network threat model
Our focus: Inter-process communication (IPC)
Man-in-the-Machine (Mit Ma)
What makes IPC vulnerable
Network socket on localhost
Network socket: Client impersonation
Network socket: Server impersonation
Network socket Man-in-the-middle
Windows named pipe: Access control
Windows named pipe: Client impersonation
Windows named pipe: Server impersonation
Windows named pipe: Man-in-the-Middle
USB HID devices
Standalone password managers
Client impersonation on RoboForm
1Password - Key derivation protocol
Server impersonation on 1Password
Password managers with Native messaging
Man-in-the-Middle on Password Boss (2)
FIDO U2F security key
Unauthorized access of FIDO U2F key
Mitigation
Conclusion
Taught by
Cooper