Google+. We report also a vulberability related to
Facebook beta version, spotted initially by [Prakash
et al.] (note however that this bug has been patched
in the meantime). Google allows unified access to a
plethora of services via the “My Account” web in-
terface at https://myaccount.google.com/?hl=en. This
means that after accessing it using their username
and password, a user is automatically logged into all
of the rest Google services, including Gmail. With
this mindset, we analyse the case of breaking Gmail
and then Google+ aiming to gain access to the user’s
Google services.
Facebook beta version: The hack in (Prakash,
2016) refers to C1 class and presents a way to access
any Facebook (FB) account by exploiting a flaw in
the beta version of FB website(Facebook beta, 2016).
More specifically, FB’s policy, specified that when-
ever an “i lost my password” request is received, a
special 6-digit code can be sent either to the user’s
email address or their phone number. For initiating
the attack, the aggressor can use an network inter-
ceptor like for example the Burp Suite (PortSwigger,
2016) in order to sniff the requests and responses be-
tween the user and the FB’s server. The next step for
the attacker would be to bruteforce the n parameter
of a special string lsd=AVoywo13&n=XXXXXX existing
in the initial http POST request. This attack is ini-
tiated using the interceptor and providing a range of
6-digit codes, which will be searched in order to find
the correct one. For every one of the aforementioned
codes, a request to the beta FB webpage is generated.
In the case of a correct code the http response is equal
to a 302 found web page, otherwise it is a 200 OK.
After receiving the 302 found response, the adversary
is able to set a password for any user account. This
allows her to access user’s personal information, in-
cluding contacts, messages, photos, etc. The attack
was feasible in the FB beta version because a block-
ing mechanism has not been activated.
Google Plus (via Gmail) Case: This case pertains
to the C4 class and reports on the widely-known gmail
service (Gmail - Free Storage and Email from Google,
2016). It specifically describes how an attacker could
easily compromise a user’s Gmail account by combin-
ing social engineering techniques with publicly avail-
able information. That is, Gmail service allows a user
to send a password recovery request by providing the
username related to the account of interest. The re-
covery process requires two steps. First off, the veri-
fication of two relatively easy to obtain pieces of data
is required. The first one corresponds to the date the
user created the account, while the other is related to
the last time the victim logged in to their account. In
the latter step, the attacker has to provide five recently
contacted email addresses. Therefore, the attacker
can easily bypass this countermeasure by sending the
same email (in carbon copy) to 4-5 other addresses,
including that of the victim.
Regarding the first step, we assume that by fol-
lowing a social engineering strategy one could rela-
tively easy obtain the necessary data. For example, if
the attacker and the victim work in the same office or
if the victim responds in some fake email, the attack
can be initiated. This happens because the aggressor
would be in position to know the last time the victim
logged in the service of interest. For the second step,
the 5 email addresses may be falsified, created by the
attacker only for this purpose. In any case, if the at-
tacker follows the aforementioned steps, the unaware
victim will have seemingly conformed to the service
policy, and thus the service will allow the attacker to
reset the password.
3.2.2 Travel Services
We analyzed the most popular (Monkey, 2016) ac-
commodation companies in Europe namely Booking,
TripAdvisor, Airbnb, and (low-cost flight companies)
RyanAir, Eurowings, and Easyjet.
TripAdvisor, and Airbnb require the user to login
by email and a 6-char long password, which combines
digits, letters, and special characters. Also, they re-
quire email confirmation after password lost, there-
fore, in terms of login policy, these services are con-
sidered generally safe. On the downside, as detailed
next, we were able to discover some vulnerabilities
in Booking, Ryanair, Eurowings, and Easyjet web
forms.
Booking: This case pertains to the far farmed
Booking company (Booking, 2016) and can be classi-
fied under C2 class. This company provides an online
service for booking an accomodation based on user
ratings, comments and price comparison. It also of-
fers an easy way to manage an already existing book-
ing to a user, without requiring full website registra-
tion and authentication, but by simply accessing the
“make change to your booking online” option. The
service requires a 9-digit booking code and a 4-digit
PIN to access the account. If the attacker knows the
booking code, for example, using Social Engineer-
ing, and bruteforces the PIN, then they can access the
booking information.
RyanAir: This scenario belongs to the C2 class
and revolves around the well-known and currently the
biggest in Europe in terms of budget, low-cost flight
company Ryanair. In the following, we describe this
attack scenario by following a two-step approach, and
we particularly concentrate on two kinds of vulnera-
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services
433