diff --git a/resources/public/webviewtest/url-spoof-ssl.html b/resources/public/webviewtest/url-spoof-ssl.html new file mode 100644 index 0000000..8c5637e --- /dev/null +++ b/resources/public/webviewtest/url-spoof-ssl.html @@ -0,0 +1,61 @@ + + + + + + + + +

URL Spoof via connections with SSL errors

+ +

+ Immediately after page load, this attacker page navigates to a URL with an SSL error. + This causes the URL in the address bar to update with a positive HTTPS indicator, but no navigation occurs. + Therefore the attacker page remains fully interactive. All permission prompts by the Status app also use the spoofed URL. +

+ + + + +
+ +

+ The attack works with a myriad of SSL error conditions, such as: +

+ Note that when tapping the links above, the loading indicator is shown again. + However, on page load, the loading indicator is not shown again since it's already being shown for this attacker page. + Therefore, on page load, the attack is not detectable. The attacker page can also change the page contents if the loading indicator is shown after page load to simulate a real navigation. +

+ + + + +