man-in-the-middle Questions
3
Solved
Suppose I am at network where there is MITM SSL swaping firewall (google.com is not issued by Google, but reissued by custom CA root authority) some more details here https://security.stackexchange...
Middleman asked 23/4, 2021 at 14:22
30
I've reinstalled my server and I am getting these messages:
[user@hostname ~]$ ssh root@pong
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION...
Chen asked 30/12, 2013 at 12:54
1
Solved
Tl;Dr: I'm creating an application: end-to-end encrypted chat between two or more users, and need fast and convinient way to visually check for an absense of man-in-the-middle
The idea behind an ap...
Bold asked 5/5, 2021 at 4:27
3
I'm trying to analyse what information an app is sending so I setup Charles but to my surprise nothing was logged out.
After decompiling the app I see that it doesn't use simple REST calls but rat...
Latecomer asked 21/10, 2017 at 13:49
4
Solved
The Django documentation on its CSRF protection states that:
In addition, for HTTPS requests,
strict referer checking is done by
CsrfViewMiddleware. This is necessary
to address a Man-I...
Crocodile asked 20/5, 2011 at 1:0
1
I did an interesting experiment today.
I opened Amazon.com in my browser, logged in, brought up Fiddler, and tried to add a brand new credit card.
I typed in my credit card number, expirati...
Flick asked 26/4, 2016 at 18:26
1
Solved
I have been looking for a way to make sure my web server is secure against a man in the middle attack. It does seem that Google Chrome and Firefox work in blocking requests to my server even if I s...
Glossectomy asked 8/4, 2016 at 16:9
1
Solved
I believe I already know the answer to this but I wanted to see if anyone had more insight into this problem. I have done certificate pinning in Android and iOS applications to make them more secur...
Ruthanneruthe asked 1/4, 2016 at 14:24
5
Solved
I've read tons of documentation related to this problem but I still can't get all the pieces together, so I'd like to ask a couple of questions.
First of all I'll describe briefly the authenticat...
Florinda asked 16/2, 2013 at 6:15
6
Solved
I've got a local application (which I didn't write, and can't change) that talks to a remote web service. It uses HTTPS, and I'd like to see what's in the traffic.
Is there any way I can do this? ...
Outofdate asked 2/7, 2009 at 8:30
4
I have an android(4.2) app that uses the https to talk to the webservice. I want to debug/log every https that goes out. I have fiddler and wireshark to debug them, but everything looks encrypted. ...
Ive asked 28/1, 2013 at 8:21
6
We seem to be going round in circles a bit at the moment. We are looking for simple light weight, preferably ruby based proxy that enables us to do the following.
Proxy HTTPS requests betwe...
Hetaerism asked 14/11, 2011 at 22:42
1
I'm trying to do a man in the middle attack with scapy on a test network. My setup is like this:
Now that you get the idea, here's the code:
from scapy.all import *
import multiprocessing
impo...
Iconic asked 30/9, 2012 at 7:37
2
Solved
I have been looking at TLS recently, and I am unsure as to why it is so secure, but probably thanks to a misunderstanding of how it works. But if the entire handshake is recorded, either using a ma...
Woke asked 4/4, 2012 at 23:36
2
Solved
How does challenge-response authentication prevent man-in-the-middle attacks? I read the wiki article but still I cannot understand.
Lionize asked 21/1, 2011 at 7:6
2
Solved
I am no expert in network security, so pardon if this question is not very smart :).
I am automating logins to some machines using ssh. I am currently avoiding host-key warnings using StrictHostKey...
Minerva asked 25/12, 2010 at 6:39
2
Solved
I am writing a little app similar to omegle. I have a http server written in Java and a client which is a html document. The main way of communication is by http requests (long polling).
I've impl...
Grapnel asked 19/6, 2010 at 12:35
5
Solved
If we consider Man In the Middle Attack;
Can such an attack occur if symmetric keys are used?
Hippocampus asked 11/5, 2009 at 0:55
1
© 2022 - 2024 — McMap. All rights reserved.