Download
hotmail hacks n.
Skip this Video
Loading SlideShow in 5 Seconds..
HoTmAil HacKs PowerPoint Presentation
Download Presentation
HoTmAil HacKs

HoTmAil HacKs

251 Views Download Presentation
Download Presentation

HoTmAil HacKs

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. HoTmAil HacKs The Sneaker Police Melody Bloxsom Omowumi Fagbami Ryan Gordon John Varghese Myrica Riddick

  2. What is Hotmail? • Bought by Microsoft in 1998 in order to compete with AOL, Yahoo • Has over 40 million active users • Originally configured for UNIX Solaris system, but MS bought it and began the process of converting it to a Windows OS • As a result of this conversion process MS is opening itself to attacks

  3. The 1998 Attack • Trojan Horse virus was created by Paul Cervenka of CSI. • It tells users that access to their accounts has been timed out, and then prompts users to resubmit information • They used JavaScript code in the email header. When the user entered his ID and password and resubmitted the data, the information would be sent to the email address in the JavaScript code.

  4. The 1998 Attack • Microsoft responded by limiting e-mails containing JavaScript in the e-mail headers.   • Cervenka modified his code to placing the JavaScript into the HTML image tags, where the Hotmail filter could not detect it • Microsoft’s reaction was to exclude all incoming e-mails including JavaScript in their header files from coming to their servers

  5. Attacks in 1999 • IP Authentication • Trojan Horse virus as an attachment • “Hackers Unite” • JavaScript in “Style” tag

  6. IP Authentication • On March 19th, 1999, IP authentication from publicly shared terminals was discovered. • Hackers realized that information could be retrieved freely from a browser’s history. • Microsoft’s quick-fix was to eliminate all aspects of IP authentication from it’s Hotmail system.

  7. Trojan Horse Virus (1999) • Cause: Virus was spread as an attachment with a Web page link. When clicked, this link caused a script on the hackers’ Web site to negotiate a “change password” request to Hotmail users • Response: Encouraged email users to only open attachments from trusted sources

  8. “Hackers Unite” • A group of 7 Americans and one Swedish person • Sent users to a Web site that mirrored that of the standard Hotmail site • When users entered this site, a small box appeared, followed by the @hotmail.com. If anything was entered before the “@” sign, and submitted, this information would be sent to Hackers Unite • By simply typing the password “eh”, they could gain full access to those accounts

  9. “Hackers Unite” • MS first denied this incident first, then proceeded to block the IPs of the Hackers Unite Web sites • In response, Hackers Unite simply created new Web sites. Due to the difficulties MS eventually reacted by taking their servers offline • MS announced they were hiring an outside firm to examine security issues based on the recommendations of TRUSTe

  10. Firm’s Recommendation • Identify the problem that allowed users access to any valid Hotmail e-mail account • Review documentation on solutions MS implemented to the hacks • Interview MS personnel responsible for identifying and fixing the problem • Review and test the source code

  11. JavaScript in “Style” tag • Cause: A new version of Java Script allowed malicious code to be embedded within a ‘STYLE’ tag • Response: MS Managers suggested that users should disable Java Scripts within the user’s browser.

  12. Who stole the Cookie? • Occurred May 10, 2000 • Hacker sends an email attachment to a user • User opens the attachment from the unknown source. • Once the attachment is open, html code then sends the user’s cookies to the hacker’s web site.

  13. How to protect yourself • Disable JavaScripts and Cookies within the browser • Change the browser options so the pages expire relatively soon • Use an Anti-Virus software, but update the database as often as you can because new viruses are created daily • Create a back-up for your files

  14. Passport • Used to authenticate Hotmail account holders.All passwords are stored at the passport site in a database • The user is issued a one-time key, which encrypts the sign-in name, password, and digital wallet. • They also block login access after X number of incorrect login attempts • No addresses or credit card information is stored in the cookie. Once the session ends, the cookie is deleted

  15. Our Recommendation • Take measures to improve it’s public face, such as accepting responsibility for past mistakes • Offer sincere apologies to those people who’s privacy may have been invaded by Hotmail attacks. • Develop an International forum that will set common laws and restrictions against hackers

  16. THE END