Week
Two ↓

“QRLJacking or Quick Response Code Login
Jacking is an attack vector capable of session hijacking and affecting all
applications that rely on the Login with QR code feature as a secure way to
login into accounts” (Mohamed,
2016). The attacker just needs to convince the victim into scanning the
attacker’s QR code.
Attack Sequence
- The Hacker clones the login QR code into a spoofed page and initiates a client side QR session;
- The victim scans the QR code upon receiving the phishing page using the targeted application;
- A token is sent to the target service and the hacker gains control of the victims account (Swati, 2016).
This can be done automatically by using
the QRLJacking Exploitation Framework. After downloading the framework,
QRLJacking Mitigation techniques
- Authentication restriction by Network Identifier and location as a hacker will probably be sited remotely;
- Session Confirmation by displaying some information about the session made;
- Two factor Authentication; a password or User ID can be used to supplement the QR login (OWASP, 2016).
References
Swati K. (July, 2016). QRLJacking –
Hacking Technique to Hijack QR Code Based Quick Login System. Retrieved from https://thehackernews.com/2016/07/qrljacking-hacking-qr-code.html
OWASP (July, 2017). QRLJacking. Retrieved from
https://www.owasp.org/index.php/Qrljacking
Mohamed A.
(November, 2016). QRLJacking – A New Social Engineering Attack Vector.
Retrieved from https://github.com/OWASP/QRLJacking
Video Credit: Mohamed A. Baset (seekurity.com). Jul 21, 2016
No comments:
Post a Comment