Skip to main content

Questions tagged [man-in-the-middle]

A man-in-the-middle attack (MiTM) is an attack against a communication protocol where the attacker relays and modifies messages in transit. The parties believe they are talking to each other directly, but in fact both are talking to each other via the attacker in the middle.

Filter by
Sorted by
Tagged with
13 votes
3 answers
2k views

The government of Kazakhstan, in order for citizens to use electronic government services (egov.kz), requires installing the NCALayer application on the computer for working with digital signatures. ...
sunvis0r's user avatar
  • 131
1 vote
1 answer
141 views

I'm a new user. I know some things about computer systems. I have a secure Domain Name System resolver server connection set up on this tablet device, a DNS over HTTPS connection - but I use a shared ...
Edward J's user avatar
1 vote
1 answer
140 views

I’m trying to intercept TLS traffic on port 8443 between an Android app and a IPcam (8443 is the webcam’s port) on my LAN, on-the-fly (like Burp Suite does with HTTP(S)). Protocol in 8443 is not HTTPS....
allexj's user avatar
  • 537
0 votes
1 answer
91 views

The challenge-response protocol ap4.0 is defined like the following: Goal: avoid replay attack Nonce: number R used only once (during the lifetime of the key/pw/...) Protocol ap4.0: to prove Alice &...
David Krell's user avatar
1 vote
0 answers
69 views

I'm working on a protected Docker based lab with three containers for education purpose to run network tools like Ettercap to perform a MITM. Here's a snippet from my Dockerfile for the attacker ...
VZK's user avatar
  • 11
0 votes
2 answers
183 views

Consider this scenario in an HTTPS (m)TLS [*] request: A trusted client sends a select query (the request) to a read-only database server The server uses a self-signed certificate, so it is ...
SOFe's user avatar
  • 133
3 votes
1 answer
351 views

When a U2F registers for the first time, the device transmits the public key to the server, what exactly prevents an attacker from performing a MITM attack and sending his own public key to the server ...
Badis Kerdellou's user avatar
1 vote
1 answer
200 views

Passwords are vulnerable to keyloggers and other man-in-the-middle attacks by malware that's running on the same device. Is this also true for biometrics like fingerprint scanners and faceID? Seems to ...
Isaac King's user avatar
2 votes
0 answers
463 views

I am currently working on a home "forensic" lab and I have set up an OPNsense-based transparent proxy (squid) to intercept and analyze HTTPS traffic coming from a Windows 11 client. I can ...
Kostas Moisidis's user avatar
3 votes
2 answers
3k views

Let's consider host A and host B with network interfaces connected directly with an ethernet cable. It can also be assumed that the physical security of this cable is okay. Neither host supports ...
krakers's user avatar
  • 45
4 votes
4 answers
3k views

For example, if I were to send a post request to a /login route, would that payload already be encrypted if the API URL is HTTPS? As far as I know, if it is in HTTPS, then the payload is already ...
MFS Craft's user avatar
2 votes
1 answer
559 views

I would like to use mitm transparent mode with wireguard So I tried this mitmweb --mode wireguard 0 (3....
Rosemary O'Annah's user avatar
2 votes
1 answer
394 views

I know that TLS MitM can get HTTP/S traffic decrypted when using certificates. I'm wondering if it has the ability to decrypt the Apple Airdrop protocol as well as it doesn't go through a server and ...
Buzzer1965's user avatar
1 vote
1 answer
244 views

I'm working on a very limited client (based on Poky from the Yocto Project), on which I want to redirect all http/https requests to my other machine on the same network. I have nftables available on ...
Breakfast Serial's user avatar
1 vote
0 answers
99 views

I have a small intranet, in which I have complete control over its deployment. I can even do MiTM, packet inspection/injection etc. There is a router and then there are 5 users behind the routers. The ...
Johnny's user avatar
  • 343

15 30 50 per page
1
2 3 4 5
93