Overview#

Malicious PAC are Attacks where an Attacker is able to Force the browser or User-agent to use a Malicious Proxy Auto-Config file.

The typical Scenario is a Public Wi-Fi (cafe, hotel, airport, …) where the Attacker uses:

  • DHCP spoofing/hijacking, sending out DHCP option code for WPAD (252)
  • DNS spoofing/hijacking, responding for /^wpad/ (WPAD) queries

Browser or User-agent then exposes the (https://) URLs to the PAC function

  • FindProxyForURL(url, host)
  • This is not an attack on TLS/SSL, TLS/SSL versions/features/configurations CAN NOT block it.!! More Information
There might be more information for this subject on one of the following: