You may not know what HTTP is exactly, but you definitely know that every single website you visit starts with it. Without the Hypertext Transfer Protocol, there'd be no easy way to view all the text, media, and data that you're able to see online. However, all communication between your browser and a website are unencrypted, which means it can be eavesdropped on.
This is where HTTPS comes in, the "S" standing for "Secure." It's an encrypted way to communicate between browser and website so that your data stays safe. While it was used mostly in banking, shopping, and other high-security situations, it's now common for many websites such as Facebook, Google, and even Wikipedia to protect your information with HTTPS. And it's most important when you're browsing the internet on free Wi-Fi hotspots, guest networks, and other non-private access points.
But that "security" isn't so secure anymore, thanks to some security researchers that will be presenting at this years Black Hat security conference in Las Vegas.
You're in a potentially malicious network (free WiFi, guest network, or maybe your own corporate LAN). You're a security conscious netizen so you restrict yourself to HTTPS (browsing to HSTS sites and/or using a "Force TLS/SSL" browser extension). All your traffic is protected from the first byte. Or is it?
[B]y forcing your browser/system to use a malicious PAC (Proxy AutoConfiguration) resource, it is possible to leak HTTPS URLs. . . . We will present the concept of "PAC Malware" (a malware which is implemented only as Javascript logic in a PAC resource) that features: a 2-way communication channel between the PAC malware and an external server, contextual phishing via messages, denial-of-service options, and sensitive data extraction from URI's.
Talking with ArsTechnica, Itzik Kotler of SafeBreach, clarified:
We show that HTTPS cannot provide security when WPAD is enabled. Therefore, a lot of people are actually exposed to this attack when they engage in browsing via non-trusted networks.
What does all this mean exactly, in laymen's terms? What you actually do on those HTTPS sites is still safe from prying eyes, but the full URL that you visit is not. It sounds innocent enough, but if that URL contains a security token, it could allow hackers to gain full control of your account. WPAD is fairly simple for hackers to take advantage of with MitM tools easily available for Metasploit, and has been exploited before in other ways.
This attack can be carried out on Linux, Mac, or Windows systems, but primarily the latter since it is the only one that is enabled by default with Internet Explorer. WPAD is not automatically enabled in Mac OS X or Linux, nor on Safari, Chrome, or Firefox browsers, so you shouldn't have to do anything on your end to protect yourself unless you use Microsoft Windows.
How to Disable WPAD in Windows
To disable WPAD in Windows, you'll need to make an easy registry edit, as StackExchange user laktak points out:
- Click the Start button, and in the search field, type in "regedit", then select "regedit.exe" from the list of results.
- Navigate through the tree to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad.
- Once you have the "Wpad" folder selected, right click in the right pane, and click on "New -> DWORD (32-Bit Value)".
- Name this new value "WpadOverride".
- Double click the new "WpadOverride" value to edit it.
- In the "Value data" field, replace the "0" with a "1", then click "OK".
- Reboot the computer.
If you're interested in this PAC Malware attack from a hacker's perspective, make sure to check out Itzik Kotler and Amit Klein's presentation at Black Hat 2016, which is scheduled for August 3, 2016 sometime between 4:20 to 5:10 p.m. PST.
Just updated your iPhone to iOS 18? You'll find a ton of hot new features for some of your most-used Apple apps. Dive in and see for yourself:
4 Comments
Or use gpedit
Group Policy Editor
Edit "Default Domain Policy"
User Configuration
Policies
Windows Settings
Connection/Automatic Browser Configuration
Automatically detect configuration settings -> DISABLE
Will this work for Windows 10?
Does it affect Chrome?
Chrome has wpad disabled by default. However it may still be enabled in the OS.
Share Your Thoughts