Spinner

A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.

About

Usage Instructions

Vulnerabilities

Publications

Contact

Spinner: Semi-Automatic Detection of Pinning without Hostname verification

Tool to enable black box detection of applications that pin to non-leaf TLS certificates and fail to carry out hostname verification. It can also be used to detect apps that have the same issue but do not pin, or indeed apps that will accept any certificate (such as self-signed).

Spinner analyses the certificate chain of the requested domains and redirects TLS traffic to other sites, which it finds on censys.io, that use the same certificate chain. The handshake is then proxied to determine if encrypted application data is sent by the app to the domain that the app is not expecting.

For details on the vulnerabilites we found using Spinner, which included apps from some of the world’s largest banks, see here. Publications related to this work are listed here.


In the video above we demonstrate three different behaviours by testing three apps. The first two are examples of apps that carry out hostname verification correctly. Two different handshake break-downs are shown. The final app, makes insecure connections which do not verify the hostname of the TLS certificate. We demonstrate this by redirecting the TLS traffic to a site which uses the same certificate chain (but with a different leaf certificate).