Questions tagged [man-in-the-middle]

An attacker who interposes himself in the middle of a connection.

An attacker who interposes himself between a client and a server. He can perpetrate both passive (eavesdropping) and active (interjection or truncation) attacks. Secure protocols such as HTTPS can guard against these attacks when correctly implemented at all layers including the application layer.

215 questions
1
vote
0 answers

How to test my app with incorrect SSL certificate?

I have an Android app using tcp connection with my server in the cloud. I was required to make test to check how my client response to wrong certifications. I do not have any access to the server in the cloud. Are there any way to intercept or any…
EldadC
  • 85
  • 2
  • 9
1
vote
2 answers

How to find out a possible man-in-the-middle the Google way?

I am wondering how is Google able to show messages like Cannot connect to the real mail.google.com or similar? Are the IP addresses of Google servers simply hard-coded within Chrome or is it possible to do a similar thing? This could help making…
Moslem Ben Dhaou
  • 6,897
  • 8
  • 62
  • 93
1
vote
2 answers

Man In the Middle Attacks and SSL

I am using OpenSSL to connect over HTTPS to one of my servers. However I cannot seem to get server verification to work on the client side. From what I understand, not verifying the certificate leaves me open to Man In the Middle attacks, but the…
Theopile
  • 868
  • 3
  • 14
  • 30
1
vote
2 answers

Avoid man in the middle (proxy) Android

I got a task at my job to reverse engineer an application. I've been using Charles Proxy several times with other applications without any problems and have also tried Fiddler. I've always been able to monitor the request/responses made. But the…
M3rd0n
  • 311
  • 3
  • 14
1
vote
1 answer

Creating Java Proxy MITM

I'm trying to create a Java program as a proxy to view packets from an incoming source to debug. To do this, I have created a simple Java server application and have edited my host file on the device. Everything works fine as of now, (even my Relay…
baseman101
  • 352
  • 1
  • 4
  • 19
1
vote
1 answer

ettercap not scanning all hosts

I tried running running ettercap as follows: sudo ettercap -i eth0 -Tq -M arp:remote,oneway -w out.data // /10.8.40.250/ But ettercap is able to add only 2 (sometimes 1) hosts to the hosts list. Scanning the whole netmask for 8191 hosts... *…
prvnsmpth
  • 195
  • 4
  • 15
1
vote
1 answer

How to fork transferred data to a script with socat?

I want to analyze the transferred data between a client and a server with socat. I’ve managed to set up socat as a man-in-the-middle with the following command: socat -x -v OPENSSL-LISTEN:4443,reuseaddr,verify=0,cert=server.crt,key=server.key…
Gumbo
  • 643,351
  • 109
  • 780
  • 844
1
vote
0 answers

change request parameters using ettercap

I am trying to modify request parameters of HTTP GET method, but the filter I wrote doesn't work as expected. I am not even sure if this is possible using ettercap. So far I wrote the following filter: if (regex(DATA.data, ".*expiration.*")){ …
rarry
  • 3,553
  • 20
  • 23
1
vote
1 answer

Is it possible to use a SSL certifcate as an intermediate CA certificate?

I'm setting up a MITM test environment on Android and I need to forge fake certificates that are then presented to the applications. In order to achieve that, I need my CA to be among the Android's trusted ones, which means that I have to manually…
Sebastiano
  • 12,289
  • 6
  • 47
  • 80
1
vote
1 answer

Manipulating HTML using mod_proxy with Apache, e.g. to remove ads

For now this is just a technical challenge, but basically I would like to do the following: Create a webbased reverse (gateway) proxy using mod_proxy and mod_proxy_html that does not only rewrite HTML urls to match the proxy's hostname, but also…
Tom
  • 8,536
  • 31
  • 133
  • 232
1
vote
1 answer

ettercap filtering doesn't work

I cant use ettercap filters. I'm writing even the most simple filter I can think of: if (ip.proto == TCP){ msg("Ran Filter\n"); } But even that doesn't work. When I compile it using etterfilter and run: sudo ettercap -F /tmp/filter.ef -T -M arp…
speller
  • 1,641
  • 2
  • 20
  • 27
1
vote
2 answers

Random string in URL helpful against "Man in the Middle Attack"?

Here's the scenario: On every non-shopping-cart page a new md5(rand()) session variable is generated. This variable is then inserted into the url for shopping cart links. Clicking the cart link would be the point at which a user is transferred from…
1
vote
0 answers

Adding Host to Cain and Abel Sniffer from Different Subnet?

I'm trying to use Cain & Abel to log the network traffic between my domain controller which is a Windows 2008 Server (Machine A) and Windows XP computer (Machine B). They're both installed as virtual machines on an ESXi server I recently bought, and…
kd3v
  • 21
  • 2
1
vote
0 answers

Air for iOS avoiding Man in the Middle attacks

In Air for iOS, I'm trying to find a way to mark when a possible Man in the Middle attack has occurred. By default, anytime you try to connect to an SSL site that has an invalid certificate, you get the error: "A secure connection with this site…
Chuck Finley
  • 295
  • 1
  • 4
  • 12
1
vote
1 answer

NPAPI debugging with logging proxy / MitM

I'm debugging/hacking on a NPAPI browser plugin and I'd like to log/wiretap communication between the browser and the plugin, to know exactly what the plugin is doing. Do you know if there is an existing tool for it? I found none. My motivation is…
juzna.cz
  • 324
  • 3
  • 10