Questions tagged [man-in-the-middle]
A man-in-the-middle attack (MiTM) is an attack against a communication protocol where the attacker relays and modifies messages in transit. The parties believe they are talking to each other directly, but in fact both are talking to each other via the attacker in the middle.
1,388 questions
13
votes
3
answers
2k
views
Installing root certificates by government
The government of Kazakhstan, in order for citizens to use electronic government services (egov.kz), requires installing the NCALayer application on the computer for working with digital signatures. ...
1
vote
1
answer
141
views
Are there any techniques that would compromise private DNS by checking connections in reverse currently
I'm a new user. I know some things about computer systems.
I have a secure Domain Name System resolver server connection set up on this tablet device, a DNS over HTTPS connection - but I use a shared ...
1
vote
1
answer
140
views
Intercepting and manipulating via MITM but with generic TLS traffic, not https. And with Android as a target
I’m trying to intercept TLS traffic on port 8443 between an Android app and a IPcam (8443 is the webcam’s port) on my LAN, on-the-fly (like Burp Suite does with HTTP(S)). Protocol in 8443 is not HTTPS....
0
votes
1
answer
91
views
Mutual authentication with symmetric challenge-response protocol ap4.0
The challenge-response protocol ap4.0 is defined like the following:
Goal: avoid replay attack
Nonce: number R used only once (during the lifetime of the
key/pw/...)
Protocol ap4.0: to prove Alice &...
1
vote
0
answers
69
views
ettercap-text-only ARP Poisoning Works in Docker Environment with three containers but No Packets Are Sniffed
I'm working on a protected Docker based lab with three containers for education purpose to run network tools like Ettercap to perform a MITM.
Here's a snippet from my Dockerfile for the attacker ...
0
votes
2
answers
183
views
Can I skip verifying server CA in mTLS if I don't need request confidentiality nor response integrity?
Consider this scenario in an HTTPS (m)TLS [*] request:
A trusted client sends a select query (the request) to a read-only database server
The server uses a self-signed certificate, so it is ...
3
votes
1
answer
351
views
Can't MITM be performed on U2F during registration?
When a U2F registers for the first time, the device transmits the public key to the server, what exactly prevents an attacker from performing a MITM attack and sending his own public key to the server ...
1
vote
1
answer
200
views
Can biometrics be intercepted locally?
Passwords are vulnerable to keyloggers and other man-in-the-middle attacks by malware that's running on the same device. Is this also true for biometrics like fingerprint scanners and faceID? Seems to ...
2
votes
0
answers
463
views
How to capture fully decrypted HTTPS traffic in a transparent proxy setup without TLS key logs?
I am currently working on a home "forensic" lab and I have set up an OPNsense-based transparent proxy (squid) to intercept and analyze HTTPS traffic coming from a Windows 11 client. I can ...
3
votes
2
answers
3k
views
Is a physical private network directly connected between hosts secure?
Let's consider host A and host B with network interfaces connected directly with an ethernet cable. It can also be assumed that the physical security of this cable is okay.
Neither host supports ...
4
votes
4
answers
3k
views
Do I need a 2nd layer of encryption through secured site (HTTPS/SSL/TLS)?
For example, if I were to send a post request to a /login route, would that payload already be encrypted if the API URL is HTTPS? As far as I know, if it is in HTTPS, then the payload is already ...
2
votes
1
answer
559
views
mitmproxy with wireguard to log all network traffic on my machine (arch linux): SERVAIL Recursive question
I would like to use mitm transparent mode with wireguard
So I tried this
mitmweb --mode wireguard 0 (3....
2
votes
1
answer
394
views
Can a TLS MITM decrypt Apple Airdrop files?
I know that TLS MitM can get HTTP/S traffic decrypted when using certificates.
I'm wondering if it has the ability to decrypt the Apple Airdrop protocol as well as it doesn't go through a server and ...
1
vote
1
answer
244
views
Redirect all outgoing http and https requests to Burp using nftables
I'm working on a very limited client (based on Poky from the Yocto Project), on which I want to redirect all http/https requests to my other machine on the same network. I have nftables available on ...
1
vote
0
answers
99
views
Identifying user behind a router [closed]
I have a small intranet, in which I have complete control over its deployment. I can even do MiTM, packet inspection/injection etc.
There is a router and then there are 5 users behind the routers.
The ...