Jump to content

Recommended Posts

Posted

i am a certified pentester myself and i cant stop beggin people to never never use public wifi signals without VPN (with good encryption algorithm)

most of the time your getting MITM or EvilTwin pwned (we can see everything you do on that browser yup yup even if you see that HTTPS )

hackers access these signals from far far far distances, even more than you can imagine... powerfull antennas exists in this world combined with the right wifi chipset capable of packets injection and full monitor mode aka promiscuous mode

 

stay safe folks 

 

  • Like 1
  • 100 1
Posted (edited)
2 hours ago, NRK said:

we can see everything you do on that browser yup yup even if you see that HTTPS )

Yes ! 

I can remember one DEFCON challenge about this subject 😂- DEFCON 18- TLS traffic with wireshark with server.pem and Google ! 

We really need to be very carreful ! 

Edited by GHARIB
  • 100 1
  • 1 year later...
Posted

Still wandering how is it possible to decrypt HTTPS traffic "on air"? Or it is decrypted afterwards?

Posted (edited)
On 2/8/2022 at 12:03 AM, em3l1en said:

Still wandering how is it possible to decrypt HTTPS traffic "on air"? Or it is decrypted afterwards?

 

 

 

Disclaimer : hacking is illegal, and this post is for informational and educational purpose only, I will not give any details about the technical "how to" or tutorial here - only basic informations.

 

Both ways are possible to decrypt:

 

1- "on air"or afterwards with a man in the middle (MITM)  / fake Access Point + ###censored### tools 😛 + The attacker will "downgrade" your SSL session to insecure HTTP  (ssl stripping) /  and it is one of the most common attack in public area.

2- afterwards with simple Wireshark capture +  pre-master-secret (without private key)  based on variables environments - and a backdoor on the victim -> yes it is possible to decrypt without a private key 😬

3- (bonus) afterwards again, If you get the Private Key stolen :( they will use it in a simple wireshark capture

 

But to be honnest, TLS (which is an improved upgrade of SSL) is quiet sure and efficient ATM! (SSL -2.0 or 3.0 - is unsecure now and outdated)

 

So my recommendations (as you are programmer / working in IT , I am sure that you are aware of this 😄 ) , so it is "general recommendation" : BE CAREFUL of any public access point (and always have a look on the padlock 🔒 of your browser - example if you are on facebook or twitter and no padlock 🔒 -> you are certainly under MITM attack ) .

 

 

hack hacking GIF
 

 

Edited by GHARIB
  • Like 4
  • 100 1
Posted

That's why I trust nobody and nothing in airports.

I assume everybody and everything wants to steal me.

  • Like 2
  • 100 1
Posted
On 2/9/2022 at 8:59 PM, Hesis said:

That's why I trust nobody and nothing in airports.

I assume everybody and everything wants to steal me.

paranoia of a healthy person

  • Haha 1
Posted
On 2/16/2022 at 11:47 PM, em3l1en said:

paranoia of a healthy person

Hmm maybe it's sounds better if I say I consider airport to be... Enemy Territory 😄

  • Haha 1
Posted
58 minutes ago, Hesis said:

Hmm maybe it's sounds better if I say I consider airport to be... Enemy Territory 😄

At least not cs_747😄

  • 100 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.