|
Auteur |
Bericht |
|
Xavior |
Geplaatst: 17 Feb 2011 17:56 Onderwerp: Oppassen met credit card gegeven PSN
| |

Geregistreerd op: 29 Jun 2007 Berichten: 72
|
Met de aankomst van firmware 3.56 was er niet alleen nieuwe firmware maar ook een rootkit van Sony zelf om mensen in de gaten te houden vanwege de hackers.
Echter is gebleken dat de beveiliging drastisch achteruit gegaan is.
Zo is gebleken op een community site dat Sony het erger vind dat bijvoorbeeld mensen hun console op andere wijze updaten ( 3rd party FW)
dan dat ze zich druk maken om de credit card gegevens van andere.
Hieruit blijkt al dat al deze gegevens over een https verbinding gaan terwijl dit in feite over een SSL hoort te gaan.
Hieronder het complete artikel:
Long time PS3 Dev SKFU posted a link on IRC and his twitter, to quite an interesting article, discussing the security of the Playstation Network(PSN), the article is written by a group calling itself “The Anonymous Data Protection Officers“, here it is in full:
Prologue
Due our objective research of the SONY PlayStation Network, we decrypted nearly 100% of the traffic transferred over proxies, http and https to and from the PSN. Just out of curiosity, not to harm anyone or anything and not like SONY may want people to see it. As SONY calls the scene hackers “evil”, we surely do not address pirates and skiddies, we wondered how SONY is treating
the users’ privacy and rights (remember the Music CD/DVD and USB stick rootkits). After we noticed a few badass functions they have built into the PSN/PS3 functionality, we just call it the “Call of Privacy: Modern Spyware” case.
Below we list and explain a few of the shady PSN functions and data mining stuff. And remember: EVERYONE has a right to know about YOUR OWN PRIVATE data being transferred over the networks !
Sensitive data
Even if a connection is SSL encrypted, companies are aware of the big risk behind custom CA files and it’s possibilities. SONY seems not to care about those known vulnerabilities. It is a big company and a HUGE network. With huge we mean a magnitude of hundreds and even thousands: the PSN utilizes thousands of servers, handled by a very small group of administrators and quality assurance people. The IP ranges and domains of these servers are retrievable by anyone, cause this is how the Internet works ! It is all public data and information ! An example is the credit card information and the login authentification itself.
Take a look at the traffic:
creditCard.paymentMethodId=CC_COMPANY&
creditCard.holderName=EXAMPLENAME&
creditCard.cardNumber=1234567890123456&
creditCard.expireYear=2012&creditCard.expireMonth=2&
creditCard.securityCode=123&
creditCard.address.address1=EXAMPLESTREET%2024%20&creditCard.address.city=EXAMPLECITY%20&
creditCard.address.province=EXAMPLEREGION%20&
creditCard.address.postalCode=12345%20
The credit card information should ALWAYS be encrypted. In ANY case. At least the security code. SONY is only relying on it’s https connection. With all those CFWs spreading around, this is not secure anymore. Same goes for the user details:
serviceid=IV0001-NPXS01001_00&
loginid=example@mail.com&
password=examplepassword&
first=true&
consoleid=EXAMPLEID123
Such sensitive data can now be captured by anyone who builds his own custom firmware with custom certificates. There are enough n00b-friendly tools by now. Means, little scriptkiddies can spread their little CFWs and phish user data. As many of these people are using a third party DNS, they are a potential victim of phishing. At the beginning of the PS3 launch, this user data was even transferred over http ! That being said, we continue with…
Information gathering
The PlayStation Network agreement states that SONY is allowed to collect nearly any data that is connected with your privacy.It is clear, that SONY won’t tell you WHAT they are collecting in the TOS etc., as many people would never accept that TOS. A few month ago we noticed the TOS silently beeing updated without a new user agreement request. It was about that you have the right to contact a “Data Protection Offier” at SCEE, who can can give you details about what data is collected. So we phoned SCEE. Beeing forwarded to many people, it turned out that there is no so called “Data Protection Officer”. Funny right? Shortly after this call, the clause was removed from the TOS. SONY itself told us, that they do not know, what we are talking about regarding this Officer. They told us, that there was never such a position inside SONY, neither a phone number. Even the address was non existing ! Still it is an impudence what huge amounts of data they are collecting. One example is an information list which is transfered everytime you login the PSN as well as at some random time.
A few short quotes:
TFT-TV
This is a string sent to SONY which includes your TV model. The list is long and contains a lot more like information about
attached USB devices, your home network, your playtime behaviour, installed games, apps, homebrews or their so called
“circumvention devices” and so on. Details about your Home network, statistics etc.
Modern user tracking we guess ;-) They try to make every PSN user transparent like a glass figurine. It seems that not only
the governments are going for such plans.
The BANHammer
Now SONY is swinging the “mighty” banhammer. Some users are banned, some are only warned. But who warns SONY? Their semi-legal tactics against the enduser are a joke. We again remember their rootkits on Audio Media and USB Sticks.
Just for your interest, we quote a guy from SONY:
Thomas Hesse, President of Sony’s Global Digital Business, literally says: “Most people, I think, don’t even know
what a rootkit is, so why should they care about it?”
This is not an urban legend -> http://www.techdirt.com/articles/20051108/0117239_F.shtml
So we could take this for an example and say: “Most people inside SONY don’t even know what security is, so why should they care about it?”
If SONY cares about their customers, why are they treating them like totally douchebags ? Of course the quote does not reflect the view of the company itself, but HELL, this was not from a Jon Doe inside SONY, it was from a Department’s President !
The PSN is a core feature of the PlayStation3, like OtherOS was. So why do they ban the PSN of users who LEGALLY run homebrew (not backups!) on their consoles? Just because they do not like it? It is a fact that reversing a system is legal in most countries all over the world, and if someone who really only wants to run his own code (no, not backups!), which he legally signed and coded without any SONY libraries or documentation, would sue SONY, they would may lose.
Reverse engineering is also allowed for analysing purposes. E.g. is a software/hardware implementing/running, rootkits, spyware, malicious code, security flaws, transferring privacy data and so on. Imagine if this wouldn’t be legal, any antivirus software would brake the law ! The companies of antivurus software are reverse engineering virus code, that is NOT copyrighted by them !
So why are those companies allowed to RE and even PUBLISH their findings to the public but not people like fail0verflow
etc. ? By studying the PSN since it’s launch we know it’s vulnerabilities pretty good right now and unbanning consoles might be as easy as banning consoles. It is an infinite circle of “who-is-better”. Sony just can not, or just don’t want to, make a clear distinction between pirates&skiddies and hackers, who only want to OWN and UTILISE what they OWN and PAID for. Hackers are responsible for creating stuff like the PC, Unix, Windows, Macs, the Internet, the WWW, AAA games etc. Guess what IBM is calling their Cell/Hypervisor docs ? Make an educated guess: Hackers Guide.
Ik zet de bron er niet bij want dit is volgens jullie ook wel duidelijk dat het om een andere community site gaat dan dat van Sony zelf, laat staan enkele game forum sites.
Mocht dit niet mogen op dit forum, waarschuw me dan in plaats van direct te bannen ^_^ .
Groetjes XVO |
|
Terug naar boven |
|
|
Joni Philips |
Geplaatst: 17 Feb 2011 18:55 Onderwerp:
| |
Eindredacteur

Geregistreerd op: 20 Okt 2003 Berichten: 24917
|
Citaat: | Such sensitive data can now be captured by anyone who builds his own custom firmware with custom certificates. | Conclusie: Mensen die hacken, kunnen je data stelen. Moest je het nog niet weten, dat geldt voor elke betaalsite/bank/... |
|
Terug naar boven |
|
|
Xavior |
Geplaatst: 17 Feb 2011 19:40 Onderwerp:
| |

Geregistreerd op: 29 Jun 2007 Berichten: 72
|
256 encrypted SSL verbinding in plaats van een simpele https. En nog een voordeel dat de meeste banken verscheidene veiligheidsmaatregelen nemen om te voorkomen dat ze ook maar iets van je rekening kunnen halen. Hetzij een bepaalde code per sms, een kastje waar je eerst je eigen bankpas in moet doen en zo zijn er nog een paar. |
|
Terug naar boven |
|
|
Joni Philips |
Geplaatst: 17 Feb 2011 20:01 Onderwerp:
| |
Eindredacteur

Geregistreerd op: 20 Okt 2003 Berichten: 24917
|
HTTPS gebruikt SSL. En SSL is al in 2008 gekraakt, ze hadden er maar 200 PS3s voor nodig. |
|
Terug naar boven |
|
|
Roderick |
Geplaatst: 17 Feb 2011 20:57 Onderwerp:
| |

Geregistreerd op: 31 Jul 2004 Berichten: 3815
|
Fact is dat t een veiligheidsrisico is op de PS3. Ik haal mn CCgegevens er vanaf. |
|
Terug naar boven |
|
|
Draster |
Geplaatst: 17 Feb 2011 21:48 Onderwerp:
| |

Geregistreerd op: 28 Jul 2009 Berichten: 438
|
Haal ze dan meteen ook maar van alle online shops die je gebruikt..
Citaat: | All HTTP-level transactions within an HTTPS connection are conducted
within the established SSL session, and no query data is transferred
before the secure connection is established.
From the outside the only data that is visible to the world it the
hostname and port you are connecting to. Everything else is simply a
stream of binary data which is enctypted using a private key shared
only between you and the server.
|
Bron
Ik zie dus niet meteen hoe custom firmware op de PS3 van andere mensen voor ons een probleem zou zijn. En als je een gehackte PS3 bezit vraag je er nu eenmaal zelf om.
Edit:
Nog even wat verder ge-google'd, en dat is dus inderdaad het geval:
Citaat: |
Update: A document written by the hackers has clarified what they did and what privacy and security risks they believe the PlayStation 3 poses. The PS3's connection to PSN is protected by SSL. As is common to SSL implementations, the identity of the remote server is verified using a list of certificates stored on each PS3. The credit card and other information is sent over this SSL connection. So far so good; this is all safe, and your web browser depends on the same mechanisms for online purchases.
The concern raised by the hackers is that custom firmwares could subvert this system. A custom firmware can include custom certificates in its trusted list. It can also use custom DNS servers. This raises the prospect of a malicious entity operating his own proxies to snaffle sensitive data. He would distribute a custom firmware that had a certificate corresponding to his proxy, and that used a DNS server that directed PSN connections to the proxy. His proxy would decrypt the data sent to it, and then re-encrypt it and forward it to the real PSN servers.
Such a scheme would be transparent to PSN users (except for any potential performance reduction caused by the proxying), and would give the attacker access to all the information that the PS3 sends to Sony. This information is shown to be extensive, but apart from the credit card data, probably not too sensitive or unreasonable.
As flaws go, the risks here are not substantial. There is no generalized ability for hackers to grab credit cards from PSN users; only those using specially devised custom firmwares would be at risk. Essentially the same risk could be faced by anyone downloading a pirated version of Windows: extra certificates could be added to those normally trusted, along with suitable DNS entries, to allow interception of any traffic destined for, say, amazon.com. In practice, the risk of either of these is slight, and in any case, trivially avoided: don't use custom firmware. |
Bron |
|
Terug naar boven |
|
|
|
|
|
|
Je mag geen nieuwe onderwerpen plaatsen in dit subforum Je mag geen reacties plaatsen in dit subforum Je mag je berichten niet bewerken in dit subforum Je mag je berichten niet verwijderen in dit subforum Je mag niet stemmen in polls in dit subforum
|
Powered by phpBB © 2001, 2005 phpBB Group
|
|