[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <AM0PR07MB616372BCE64A885E46FD9ECCDCCD9@AM0PR07MB6163.eurprd07.prod.outlook.com>
Date: Wed, 1 Sep 2021 13:15:23 +0000
From: Gökhan Muharremoglu <gokmuh@...mail.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Mirror on the Fly Attack
Dear all,
I’d like to share an attack concept study with you.
With the help of new technologies in the application engineering (especially in the web application area) now it is possible to create man in the middle attacks that can bypass too many security countermeasures (2FA, OTP, CAPTCHA, SSL, Security Picture, Browser Remembering, etc.) by utilizing an approach we called mirroring on the fly...
At the mirroring on the fly approach, man in the middle attack happens on the fly by mirroring/cloning a valid resource simultaneously in the real time. During the cloning and mirroring process it is possible to modify and eavesdrop the communication.
Mirror on the Fly Attack (a replacement for SSLStrip and many MitM attacks)
https://youtu.be/hYVXJARTxT4
Thanks,
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists