What is Drown Attack?
What is Drown Attack?
Drown is a serious and vulnerable attack which targets HTTPS and affects TLS and SSL(protocols used in encryption of data) which are based on HTTPS, so that no third party can read your data, across the Internet while communicating with server to authenticate your identity or to send messages, files and emails to a particular server. To breach that encryption or secure channel, drown attack is used.
Drown is a vulnerable attack which is designed to target HTTPS protocol suite system like SSL and TLS, these protocols are used for encryption purpose while communicating over Internet, these protocols provides a secure channel to communicate with server . When a user communicates with server and enters its sensitive information like Credit card number, CVV, Pins and other data like emails, instant messages, all of these are encrypted over a channel to provide customer security, so that no third party or intruder can breach the security to gain access on it or to read a private conversation.
In a Drown attack an intruder or attacker breaches the HTTPS protocol or encryption to read or gain access over sensitive information, while you are doing online shopping, emails and messaging, and exchanging your sensitive information like Credit card no., CVV and other pins.
How Drown attack takes place?
Drown attack takes place in two manners like,
1. When a server allows SSLv2 connection to the server. Where SSLv2 is a weak encryption method which is easy to breach now.
2. When a server uses the same private key to its web server and its web mail server drown attack takes place. In most of the cases many companies use same certificate and private key on web and mail server. In case email server allows SSLv2 connection while web server allow TLS connection. A hacker can take advantages of SSLv2 enabled server to break TLS encryption.
A user or a Browser can’t do anything in Drown Attack only operator of the vulnerable server can take care in order to stop drown attack, by making sure that all SSLv2 connection has been disabled onto that server, and only TLS connections are allowed on that servers.
keep learning from computerflicks because it is beyond computing.
Comments
Post a Comment