Questions tagged [man-in-the-middle]

42 questions
0
votes
1 answer

Non proxy aware client, (mitm)proxy modification of headers

What I am trying to achive Pulling data, using a SaaS service, from a remote site with a simple GET request to mitmproxy. The SaaS service is not proxy aware. I want the SaaS web client to do a GET request to mitmproxy, basically like this: GET…
xeet
  • 300
  • 2
  • 7
0
votes
2 answers

Can a man in the middle intercept an SSL package and duplicate it?

AFAIK, SSL will encrypt the message under secure. But I still have the concern whether or not a man in the middle can catch the package and duplicate it e.g. 1000 times
Lewis LE
  • 1
  • 1
0
votes
0 answers

is there a man in the middle attacking to my server machine?

My server works well about half a year. But a strange thing happened (several hours before). This server has two IP-address 58.17.85.19 & 117.21.178.19 When I navigate to http://58.17.85.19, nothing different as before. But http://117.21.178.19 will…
GongT
  • 53
  • 1
  • 1
  • 6
0
votes
2 answers

Man-In-The-Middle with a VPN?

I'm doing some researches for university and, before wasting a lot of time into it, I'd like to know if what I've got in my mind can be done. I'm talking about a simple MITM attack but, in my scenario, the victim is forced to use a VPN to access the…
StepTNT
  • 123
  • 2
  • 7
0
votes
3 answers

Log an Application's Network Activity with Process Monitor and/or Fiddler or something else

I've got a bit of a tricky application I need to monitor. Its a Java .jnlp file. Using Process Monitor, I've been able to identify it (its instance of javaw) going out to the other servers in my network; however, running Fiddler, it shows no…
Nate
  • 2,151
  • 6
  • 26
  • 41
0
votes
1 answer

Apache2: proxying all except one single file

I have a problem with MSDN Academy that they didn't solve. Unfortunately, the ISO image of Windows Server 2008 on their servers is misnamed. By using Wireshark, I found that the downloader erroneously tries to download a file that starts with…
usr-local-ΕΨΗΕΛΩΝ
  • 2,359
  • 7
  • 34
  • 52
0
votes
3 answers

Ettercap - packet injection / alteration

So I have a proxy setup using squid on port 3128. I also have ettercap setup. My main goal is to change data as it flows through my proxy. Basically, you open up www.something.com using my proxy, it displays "lala", and I want to alter "lala"…
Adrian A.
  • 85
  • 1
  • 2
  • 12
0
votes
1 answer

Can you self-host a DNS server with custom domains and still get TLS?

I assume the easy answer here is no, but I'm wondering the following. Without having to pre-install a certificate on each client, can I get TLS support for domains if I self-host a DNS server? For example: I host a DNS server that maps…
0
votes
1 answer

Redirect TLS traffic by hostname

I have an IoT device that connects to a.iot.x.amazonaws.com at port 8883 (secure MQTT). I would instead like it to connect to my own site at b.iot.x.amazonaws.com (same port and protocol). I would like to use network tools to redirect the traffic. I…
0
votes
1 answer

HTTPS and MITM attack

VPN companies claim that your sensitive data can be intercepted. But what I know is that as long as I stick with HTTPS, no MITM attack is successful at present. Am I right?
Bhavya Gupta
  • 111
  • 3
0
votes
1 answer

Reading and manipulating traffic between two ethernet nodes

I have two machines, directly connected via LAN cable. Each has their own IP, and they are communicating in their own VLAN. 10.10.10.99/25 for machine #1, 10.10.10.16/25 for machine #2, vlan 0x50. I cannot change any of the IPs, netmasks,…
-1
votes
1 answer

Set up Ubuntu server to intercept traffic directed at another IP and send it to Apache?

I'm trying to reverse-engineer the protocol used by HP ePrint. For some reason the printer responds with an error when I override the DNS to point to my own local server, so I decided to create a static routing entry on the router to send traffic…
flarn2006
  • 111
  • 5
1 2
3