TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: What prevents the following vulnerability I found from being exploited?

4 点作者 vitalipom4 个月前
I&#x27;ve now consulted ChatGPT on a solution for a vulnerability which I even filed a patent for long time ago and I feel less stupid right now.<p>Say bank.com has SSL. Cool! Now how does Angular work? You visit angular-site.com&#x2F;some&#x2F;path and backend server rewrites the request to angular-site.com&#x2F;index.html. You still see angular-site.com&#x2F;some&#x2F;path. And it works and that&#x27;s how Angular servers that serve Angular apps work.<p>Now, what prevents bank-malicious-url.com from acting like a viewer, where it access bank.com when you visit it hence the SSL encryption&#x2F;decryption is made between it and the legit bank.com, whilst malicious-bank.com url has a simple letsencrypt certificate that is showing you a not so legit green secured URL web address on the top of your web browser?<p>Please help! I abandoned my patent, I&#x27;ve been building my Angular web app and now I think that the old me was not so dumb after all. Where to proceed from now?

5 条评论

efortis4 个月前
my-bank.com backend replays requests to bank.com<p>Yes, that’s a phising technique. CORS, CSP, or CSFR tokens can’t prevent it.<p>---<p>bank.com can mitigate it by blocking my-bank.com IPs<p>---<p>This 2007 paper [1] is about the initial mitigation idea, which was using Extended Validation Certificates (EV SSL). The study showed that users didn&#x27;t pay attention to the special UI address bar EV certs had. In 2018 Chrome removed that UI style [2]<p>[1] <a href="http:&#x2F;&#x2F;www.usablesecurity.org&#x2F;papers&#x2F;jackson.pdf" rel="nofollow">http:&#x2F;&#x2F;www.usablesecurity.org&#x2F;papers&#x2F;jackson.pdf</a><p>[2] <a href="https:&#x2F;&#x2F;www.ghacks.net&#x2F;2018&#x2F;05&#x2F;18&#x2F;google-chrome-removal-of-secure-and-https&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ghacks.net&#x2F;2018&#x2F;05&#x2F;18&#x2F;google-chrome-removal-of-s...</a>
评论 #42783310 未加载
alp1n3_eth4 个月前
I think I understand the situation correctly, but please correct me if I&#x27;m wrong. You&#x27;re essentially asking &quot;How does realBank.com stop fakeBank.com from sending requests on behalf of the user to realBank.com&quot;?<p>The malicious site could go about a few ways of potentially using functionality based on what protections the real bank&#x27;s site is using. If it&#x27;s not protected against CSRF &amp; JWTs aren&#x27;t in use, it could send a request on behalf of the user.<p>If the bank&#x27;s site allows framing, a clickjacking attack could occur.<p>---<p>From your further comments though, it also sounds like you may be talking about phishing. There are several PoCs and real-world examples of attackers hosting a fake login page for Microsoft&#x2F;Apple&#x2F;Facebook and interacting in real-time with the real site. This allows them to also prompt the user for an MFA code which they&#x27;ll use to authenticate.<p>If it&#x27;s this phishing scenario, there&#x27;s not a big way to block these for completely public-facing sites. Anything behind a VPN &#x2F; whitelist would be impossible though (ofc).
评论 #42783254 未加载
fragmede4 个月前
That&#x27;s a regular MitM attack, just with, specifically, Angular. If you can convince someone to go to malicious-bank.com and log into it with their real credentials, you&#x27;ve successfully phished them. If you go a step further and show them the real information from the real website, thats going a step further, but by then it&#x27;s game over already.<p>If the attacker&#x27;s already convinced you to give them your username&#x2F;password (and 2fa), why bother showing the victim a fake (Angular) website?<p>A password manager&#x2F;passkey&#x2F;yubikey protects against this by checking that the url is bank.com and not malicious-bank.com, but unsophisticated users fall for this attack every day.
评论 #42783961 未加载
p_ing4 个月前
A CSP will prevent this.<p><a href="https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;Content-Security-Policy" rel="nofollow">https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;Co...</a>
评论 #42773740 未加载
NetworkPerson4 个月前
Honestly, I think less attackers go this route than a simple clone of the target website and logging of credentials people enter. Much easier phishing than trying to interact with the real website. Saw this for a bank recently and sent an abuse email to the phishing domain’s registrar. Maybe 4 hours later and the registrar had killed it.
评论 #42784004 未加载