As part of configuring a large number of systems within a network, the Proxy-Auto Configuration (PAC) file is used to have a common configuration. This is done by using the feature called Web Proxy Auto Discovery (WPAD) that helps the browser to determine the available PAC file. PAC file path is configured in DHCP servers. The attacker impersonates as the DHCP server and provides the malicious PAC file to the user. PAC file determines the proxy server to be used for a particular Uniform Resource Locator (URL). Attacker has to be on the same network as the victim or able to spoof DHCP response packets. The PAC file is retrieved from the attacker web server. The attacker replaces the PAC file with malicious PAC file that can redirect traffic to the attacker IP address. Victim is redirected to the attacker controlled proxy server. The attacker is able to view the URL the victim visits. This is performed before a secure connection is established between the client and the web server. This attack can be mitigated by using a technique called DHCP snooping in switches that can verify DHCP messages passing through the switch that prevents impersonation of DHCP server.
[1]
Zhenkai Liang,et al.
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
,
2015,
Computers & security.
[2]
B Sugavanesh,et al.
SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks
,
2013,
SOEN.
[3]
Ameer Al-Nemrat,et al.
ARP Cache Poisoning Mitigation and Forensics Investigation
,
2015,
2015 IEEE Trustcom/BigDataSE/ISPA.
[4]
Zhuoqing Morley Mao,et al.
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
,
2016,
2016 IEEE Symposium on Security and Privacy (SP).
[5]
Xiang Cui,et al.
POSTER: Sniffing and propagating malwares through WPAD deception in LANs
,
2013,
CCS.
[6]
Ralph E. Droms,et al.
Dynamic Host Configuration Protocol
,
1993,
RFC.