HTTPS: A phishing attack in a network

Diana Gabriela Noemí Benítez-Mejía, Alejandro Zacatenco-Santos, Linda Karina Toscano-Medina, Gabriel Sánchez-Pérez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, we discuss the possibility of finding phishing attacks even in cases where the victim sees in their web browser, the same URL as the legitimate website with the padlock and the HTTPS certificate. This attack is not easy to detect due to the fact that it complies with security measures as a legitimate HTTPS connection. We perform the attack with a web server and a fake certificate authority. The web server hosts the phishing website, whereas the fake certificate authority, issues the certificates for the website. The success of this attack occurs when the victim or the attacker exports the certificates into the web browser. With this paper we prove that some web browsers are vulnerable to this attack, despite their having their own certificate authorities list.

Original languageEnglish
Title of host publicationICICM 2017 - Proceedings of the 7th International Conference on Information Communication and Management
PublisherAssociation for Computing Machinery
Pages24-27
Number of pages4
ISBN (Electronic)9781450352796
DOIs
StatePublished - 28 Aug 2017
Event7th International Conference on Information Communication and Management, ICICM 2017 - Moscow, Russian Federation
Duration: 28 Aug 201730 Aug 2017

Publication series

NameACM International Conference Proceeding Series
VolumePart F131202

Conference

Conference7th International Conference on Information Communication and Management, ICICM 2017
Country/TerritoryRussian Federation
CityMoscow
Period28/08/1730/08/17

Keywords

  • Certificate authority
  • Certificates
  • HTTPS
  • Phishing
  • SSL
  • Web browser

Fingerprint

Dive into the research topics of 'HTTPS: A phishing attack in a network'. Together they form a unique fingerprint.

Cite this