Questions tagged [man-in-the-middle]

An attacker who interposes himself in the middle of a connection.

An attacker who interposes himself between a client and a server. He can perpetrate both passive (eavesdropping) and active (interjection or truncation) attacks. Secure protocols such as HTTPS can guard against these attacks when correctly implemented at all layers including the application layer.

215 questions
0
votes
1 answer

Can Man in the middle open a logged page?

I know that man in the middle (mitm) can be in passive mode : forward, or active mode : modify trafic and forward... But Can mitm open a page, in firefox for example, to connect on a website where i was logged. Is this possible ?
Voyageur2000
  • 269
  • 3
  • 13
0
votes
1 answer

Attack from Middle Man , how Resolve?

I'm developing one site, my dates are encrypted in AES-256-OFB with functions of MySql, in this way I encrypt and decrypt in End To End, right? If it is true, how resolve attack by Middle Man, in addition to using SSL? Are there any encryptions for…
Hsrtick
  • 9
  • 4
0
votes
2 answers

Is it insecure to execute code via an HTTP URL?

I'm suspicious of the installation mechanism of Bioconductor. It looks like it is just executing (via source()) the R script from an HTTP URL. Isn't this an insecure approach vulnerable to a man-in-the-middle attack? I would think that they should…
Will Townes
  • 1,787
  • 1
  • 17
  • 21
0
votes
1 answer

Bash script to check if router's IP to mac address has changed from a computer

I'm trying to create a script to check if my router's IP to MAC address has changed from the view of my computer. Basically trying to check if a MITM attack is taking place. I cannot get this to work; the IP 172.16.213.254 is my gateway IP. arp -a…
user001
  • 19
  • 3
0
votes
1 answer

No need to encrypt data for https?

I was monitoring web traffic from my Android mobile using a man-in-the-middle proxy. As part of this I installed a certificate (signed by my server) to my mobile and I could see all applications sending sensitive information like passwords as clear…
cyn0
  • 522
  • 2
  • 7
  • 23
0
votes
4 answers

Detect when users deliberately bypass https server certificate errors

Is there a https header on the server, or JavaScript method in the browser, that will let us detect when the user has intentionally bypassed the security certificate, or any other way to detect and report this kind of situation? (We are using Linux…
JTW
  • 51
  • 6
0
votes
1 answer

Is WCF affected by FREAK attack?

There is new attack named as FREAK Is WCF affected by FREAK attack? As I understood from this question there is no way how to programmatically specify allowed cipher in WCF.
Yuriy
  • 2,670
  • 6
  • 33
  • 48
0
votes
1 answer

How to detect ips using nmap?

I am currently working on demonstrating Man in middle Attack foe which I am using my phone as a Victim and my PC running ubuntu 14.04LTS as attacker. I am using nmap to ping my phone to check if its online... nmap -e wlan0 -sn 172.16.95.198 But…
0
votes
0 answers

Android. Secondary preferred app

I'm trying to implement something like man-in-the-middle app that will launch specific actions on some broadcasts, activity starts and then launch the secondary default app to do the rest of things. For example: Facebook (click on web link) ->…
0
votes
1 answer

Why Sniff Session Cookies when UN/PW should also be available?

I've recently been reading on session cookies and how they can be hijacked via man-in-middle attacks. It seems this is mainly possible on an unencrypted connection between a client and a webserver. However, I cannot figure out why, if one is already…
Islay
  • 478
  • 4
  • 17
0
votes
1 answer

Is self-signed HTTPS + WHITELISTED IP safe for RPC

There is a HTTPS server with self-signed certificate on IP A and a https client on IP B. The server only allow access from IP B in IPTABLES. The client access server with the correct domain name and IP(defined in local host file). Is this a safe…
user869210
  • 231
  • 1
  • 8
0
votes
1 answer

MITM proxy using FiddlerCore

We want to implement a MITM proxy. It should receive https requests from client, decrypt them and return pre-recorded responses. It means that the proxy is not connected to remote server directly. I know that FiddlerCore supports MITM, but how can…
Sali Hoo
  • 743
  • 2
  • 8
  • 22
0
votes
2 answers

Man In Middle Attack for HTTPS

A man in middle can decrypt the certificate(public key for decryption is available on everywhere) and steal the public key for the session. Now the middle man can read all encrypted messages from web server to client. But cannot read messages from…
qnimate
  • 879
  • 1
  • 7
  • 12
0
votes
1 answer

Is it possible to check the integrity of data encrypted using AES?

I am encrypting my payload using AES, before sending it over a TCP connection. Is it possible to verify whether it has been modified during transit by someone who doesn't have access to the shared key? To expand, does this make sense? Before…
MichaelAttard
  • 1,898
  • 2
  • 17
  • 26
0
votes
1 answer

difference between Man-in-Middle and DNS poisoning attack?

I read that there are two types of redirect attacks on DNS servers 1) Man-in-Middle 2) DNS poisoning what is the difference between these two types ?
Mahmoud Hanafy
  • 1,861
  • 3
  • 24
  • 33