| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <AM0PR07MB616372BCE64A885E46FD9ECCDCCD9@AM0PR07MB6163.eurprd07.prod.outlook.com> Date: Wed, 1 Sep 2021 13:15:23 +0000 From: Gökhan Muharremoglu <gokmuh@...mail.com> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] Mirror on the Fly Attack Dear all, I’d like to share an attack concept study with you. With the help of new technologies in the application engineering (especially in the web application area) now it is possible to create man in the middle attacks that can bypass too many security countermeasures (2FA, OTP, CAPTCHA, SSL, Security Picture, Browser Remembering, etc.) by utilizing an approach we called mirroring on the fly... At the mirroring on the fly approach, man in the middle attack happens on the fly by mirroring/cloning a valid resource simultaneously in the real time. During the cloning and mirroring process it is possible to modify and eavesdrop the communication. Mirror on the Fly Attack (a replacement for SSLStrip and many MitM attacks) https://youtu.be/hYVXJARTxT4 Thanks, _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists