Journal of Information Processing
Online ISSN : 1882-6652
ISSN-L : 1882-6652
 
Man-in-the-Portal: Breaking SSL/TLS Silently Abusing Captive Portal
Keiichiro KimuraHiroki KuzunoYoshiaki ShiraishiMasakatu Morii
Author information
JOURNAL FREE ACCESS

2024 Volume 32 Pages 1066-1081

Details
Abstract

The proliferation of public hotspots has led to the use of captive portals to protect hotspots and ensure their appropriate use. Captive portals control external sessions until user authentication at the hotspot is complete. One feature of captive portals is that these can redirect the authenticated user to an arbitrary website. However, cyber-attacks have been reported that exploit captive portals and there is an urgent need to improve the protocol of captive portals. In this paper, we reveal a critical flaw in the captive portal protocol and propose a man-in-the-middle attack that exploits the flaw to disable SSL/TLS. We name this attack Man-in-the-Portal (MITP). The attack is the first to exploit the post-authentication redirection of a captive portal as a starting point to disable SSL/TLS. The attacker can easily eavesdrop on and tamper with a victim device's communications. Our attack is also feasible without requiring any special privileges or tools. To demonstrate the effectiveness and practicality, we evaluate the MITP attack on five commercially available wireless devices as our proof-of-concept, and show that the attack poses significant threats. Furthermore, we analyze the root causes of the MITP attack and present protocol-level countermeasures to improve the security of wireless communications.

Content from these authors
© 2024 by the Information Processing Society of Japan
Previous article Next article
feedback
Top