man-in-the-middle Questions

3

Solved

Suppose I am at network where there is MITM SSL swaping firewall (google.com is not issued by Google, but reissued by custom CA root authority) some more details here https://security.stackexchange...
Middleman asked 23/4, 2021 at 14:22

30

I've reinstalled my server and I am getting these messages: [user@hostname ~]$ ssh root@pong @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION...
Chen asked 30/12, 2013 at 12:54

1

Solved

Tl;Dr: I'm creating an application: end-to-end encrypted chat between two or more users, and need fast and convinient way to visually check for an absense of man-in-the-middle The idea behind an ap...

3

I'm trying to analyse what information an app is sending so I setup Charles but to my surprise nothing was logged out. After decompiling the app I see that it doesn't use simple REST calls but rat...
Latecomer asked 21/10, 2017 at 13:49

4

Solved

The Django documentation on its CSRF protection states that: In addition, for HTTPS requests, strict referer checking is done by CsrfViewMiddleware. This is necessary to address a Man-I...
Crocodile asked 20/5, 2011 at 1:0

1

I did an interesting experiment today. I opened Amazon.com in my browser, logged in, brought up Fiddler, and tried to add a brand new credit card. I typed in my credit card number, expirati...
Flick asked 26/4, 2016 at 18:26

1

Solved

I have been looking for a way to make sure my web server is secure against a man in the middle attack. It does seem that Google Chrome and Firefox work in blocking requests to my server even if I s...
Glossectomy asked 8/4, 2016 at 16:9

1

Solved

I believe I already know the answer to this but I wanted to see if anyone had more insight into this problem. I have done certificate pinning in Android and iOS applications to make them more secur...
Ruthanneruthe asked 1/4, 2016 at 14:24

5

Solved

I've read tons of documentation related to this problem but I still can't get all the pieces together, so I'd like to ask a couple of questions. First of all I'll describe briefly the authenticat...
Florinda asked 16/2, 2013 at 6:15

6

Solved

I've got a local application (which I didn't write, and can't change) that talks to a remote web service. It uses HTTPS, and I'd like to see what's in the traffic. Is there any way I can do this? ...
Outofdate asked 2/7, 2009 at 8:30

4

I have an android(4.2) app that uses the https to talk to the webservice. I want to debug/log every https that goes out. I have fiddler and wireshark to debug them, but everything looks encrypted. ...
Ive asked 28/1, 2013 at 8:21

6

We seem to be going round in circles a bit at the moment. We are looking for simple light weight, preferably ruby based proxy that enables us to do the following. Proxy HTTPS requests betwe...
Hetaerism asked 14/11, 2011 at 22:42

1

I'm trying to do a man in the middle attack with scapy on a test network. My setup is like this: Now that you get the idea, here's the code: from scapy.all import * import multiprocessing impo...

2

Solved

I have been looking at TLS recently, and I am unsure as to why it is so secure, but probably thanks to a misunderstanding of how it works. But if the entire handshake is recorded, either using a ma...
Woke asked 4/4, 2012 at 23:36

2

Solved

How does challenge-response authentication prevent man-in-the-middle attacks? I read the wiki article but still I cannot understand.

2

Solved

I am no expert in network security, so pardon if this question is not very smart :). I am automating logins to some machines using ssh. I am currently avoiding host-key warnings using StrictHostKey...
Minerva asked 25/12, 2010 at 6:39

2

Solved

I am writing a little app similar to omegle. I have a http server written in Java and a client which is a html document. The main way of communication is by http requests (long polling). I've impl...
Grapnel asked 19/6, 2010 at 12:35

5

Solved

If we consider Man In the Middle Attack; Can such an attack occur if symmetric keys are used?
Hippocampus asked 11/5, 2009 at 0:55
1

© 2022 - 2024 — McMap. All rights reserved.