One Leak Is Enough to Expose Them All From a WebRTC IP Leak to Web-Based Network Scanning

WebRTC provides browsers and mobile apps with rich real-time communications capabilities, without the need for further software components. Recently, however, it has been shown that WebRTC can be triggered to fingerprint a web visitor, which may compromise the user’s privacy. We evaluate the feasibi...

Full description

Saved in:
Bibliographic Details
Published inEngineering Secure Software and Systems pp. 61 - 76
Main Authors Hazhirpasand, Mohammadreza, Ghafari, Mohammad
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 20.06.2018
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319944959
9783319944951
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-94496-8_5

Cover

Abstract WebRTC provides browsers and mobile apps with rich real-time communications capabilities, without the need for further software components. Recently, however, it has been shown that WebRTC can be triggered to fingerprint a web visitor, which may compromise the user’s privacy. We evaluate the feasibility of exploiting a WebRTC IP leak to scan a user’s private network ports and IP addresses from outside their local network. We propose a web-based network scanner that is both browser- and network-independent, and performs nearly as well as system-based scanners. We experiment with various popular mobile and desktop browsers on several platforms and show that adversaries not only can exploit WebRTC to identify the real user identity behind a web request, but also can retrieve sensitive information about the user’s network infrastructure. We discuss the potential security and privacy consequences of this issue and present a browser extension that we developed to inform the user about the prospect of suspicious activities.
AbstractList WebRTC provides browsers and mobile apps with rich real-time communications capabilities, without the need for further software components. Recently, however, it has been shown that WebRTC can be triggered to fingerprint a web visitor, which may compromise the user’s privacy. We evaluate the feasibility of exploiting a WebRTC IP leak to scan a user’s private network ports and IP addresses from outside their local network. We propose a web-based network scanner that is both browser- and network-independent, and performs nearly as well as system-based scanners. We experiment with various popular mobile and desktop browsers on several platforms and show that adversaries not only can exploit WebRTC to identify the real user identity behind a web request, but also can retrieve sensitive information about the user’s network infrastructure. We discuss the potential security and privacy consequences of this issue and present a browser extension that we developed to inform the user about the prospect of suspicious activities.
Author Ghafari, Mohammad
Hazhirpasand, Mohammadreza
Author_xml – sequence: 1
  givenname: Mohammadreza
  surname: Hazhirpasand
  fullname: Hazhirpasand, Mohammadreza
  email: mhhazhirpasand@inf.unibe.ch
– sequence: 2
  givenname: Mohammad
  surname: Ghafari
  fullname: Ghafari, Mohammad
BookMark eNpFkE1PAjEQhqti4oL8Ai-9eKx0tp9zJGRVkk24wLnZLS0o65ZQTPz5rmjiaTLzvpnkecZk1Kc-EPIA_Ak4NzM0lgkmABlKiZpZp67IWAyHy26uSQEagAkh8eY_UDgiBRe8ZGikuCPTnN855yUXCIAFeVz1gdahOdBlplWfPnd7ek60-jqmHOh6Hz7ovOvuyW1suhymf3NCNs_VevHK6tXLcjGvWQY0Z6a9idpsY_St9lEhtlJZ41sZvLEyemUaHyGiVjKGAAosB9nqOLDZbamNmBD4_ZuPp7d-F06uTemQHXD3I8ENRSfcgOYu0G6QIL4BBj1K5g
ContentType Book Chapter
Copyright Springer International Publishing AG, part of Springer Nature 2018
Copyright_xml – notice: Springer International Publishing AG, part of Springer Nature 2018
DOI 10.1007/978-3-319-94496-8_5
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 3319944967
9783319944968
EISSN 1611-3349
Editor Payer, Mathias
Such, Jose M.
Rashid, Awais
Editor_xml – sequence: 1
  givenname: Mathias
  surname: Payer
  fullname: Payer, Mathias
  email: mathias.payer@nebelwelt.net
– sequence: 2
  givenname: Awais
  surname: Rashid
  fullname: Rashid, Awais
  email: awais.rashid@bristol.ac.uk
– sequence: 3
  givenname: Jose M.
  surname: Such
  fullname: Such, Jose M.
  email: jose.such@kcl.ac.uk
EndPage 76
GroupedDBID -DT
-~X
29L
2HA
2HV
ACGFS
ADCXD
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
LAS
LDH
P2P
RSU
~02
ID FETCH-LOGICAL-s197t-6c7f67dffcb6cf599b4587cb4ec784fc57acf1f9654fee1518014b6f9788d2673
ISBN 3319944959
9783319944951
ISSN 0302-9743
IngestDate Tue Jul 29 20:11:05 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s197t-6c7f67dffcb6cf599b4587cb4ec784fc57acf1f9654fee1518014b6f9788d2673
PageCount 16
ParticipantIDs springer_books_10_1007_978_3_319_94496_8_5
PublicationCentury 2000
PublicationDate 20180620
PublicationDateYYYYMMDD 2018-06-20
PublicationDate_xml – month: 06
  year: 2018
  text: 20180620
  day: 20
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesSubtitle Theoretical Computer Science and General Issues
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings
PublicationTitle Engineering Secure Software and Systems
PublicationYear 2018
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Hartmanis, Juris
Mattern, Friedemann
Goos, Gerhard
Steffen, Bernhard
Kittler, Josef
Weikum, Gerhard
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
– sequence: 13
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
– sequence: 14
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
SSID ssj0002039119
ssj0002792
Score 1.8911021
Snippet WebRTC provides browsers and mobile apps with rich real-time communications capabilities, without the need for further software components. Recently, however,...
SourceID springer
SourceType Publisher
StartPage 61
SubjectTerms Browser security
IP leak
Web-based network scanner
Subtitle From a WebRTC IP Leak to Web-Based Network Scanning
Title One Leak Is Enough to Expose Them All
URI http://link.springer.com/10.1007/978-3-319-94496-8_5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELagXBYOy2PRwgLyAS5EWTVNYjuHPSBUXuJxAFbcIse11dVuU9QE7aq_fmdiJw0tF7hEVVIl8Xz2l5mx5zMhh6bLjWQD5oPvYfzIwFAUUZz4shtqBdzATVWVdnPLLh6jq6f4aVauWFWXlNl3NX2zruQjqMI5wBWrZN-BbHNTOAG_AV84AsJwnHN-X6dZ3XR-oyRos-bauwdO_SvdjEBbi7yimOnw1-RZFm4l4814KEcjOZjoacPM50NppC09ry-3u9RdjuU_8rd3WXj9vNreBzzX_r9nXPMO_W3knfyxvRJbr4sf126C4nZcVuu-vHoPiZpS2jmHQODaqF53Iec4l7WcJc5eBalhiPrDEIgFLW4LgYghlLHcpi33MlRUDK2CqeNTK9Tuvsx2o5gFzm8v88CSLHwW80UaL5NlLqIOWTnpX13_bDJvPRTFRxE7971GCUU712RfCSuA6ldOrEbTrAmNcJXVJp574sJ0euWlPKyTNaxcoVhSAgbbIEs63ySfa5tTZ_NNstrqOlvkCGClCCu9LKiFlZZjamGlCCsFWL-Qx7P-w-mF7zbP8Isg4aXPFIeBNzBGZUyZOEmyKBZcZZFWYBSjYi6VCUzC4shoDX4fyghlzECrxKDHeLhNOvk4118J7UGMLAOphMhkBOGq1OClBiFLBNeBUXKHHNetTnE4FGmthQ03S8MUTJRWJkrBRLvv-fM38mnW_fZIp5y86H1wAsvswKH6HzINUgw
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Hazhirpasand%2C+Mohammadreza&rft.au=Ghafari%2C+Mohammad&rft.atitle=One+Leak+Is+Enough+to+Expose+Them+All&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2018-06-20&rft.pub=Springer+International+Publishing&rft.isbn=9783319944951&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=61&rft.epage=76&rft_id=info:doi/10.1007%2F978-3-319-94496-8_5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon