Impersonation and man-in-the-middle attacks (1)
- Attacks (see the slide 9 from the first lecture)
– outsider / insider
– passive / active
– coalition - Concepts (see the slides from the second lecture):
– secret key
– public key
– nonce - Impersonation and MITM attacks
- Proxy servers and VPN (see the video)
- mitmproxy on Kali linux (see the documentation)
Commands – some examples:- clear (CTRL + L)
- mitmproxy –h (help)
- q and Q( end session)
- curl (client URL – for sending and receiving data from the server)
- curl site
- curl file site (the page will be saved in the file)
- curl site -I (capital i)
- curl – -proxy [protocol://]host[:port] <target>
- curl – -proxy http://localhost:8080 site
- interception using mitmproxy (http://wttr.in/city )
- i (intercepts and stops the response)
- ‘~u [regulate expression]’
- [client’s request]
- [open the red text]
- e
- path
- [change the request’s path]
- Esc
- q
- a (sends the modified response)
- MITM attacks with mitmproxy
- Project 2 (3 students)
Proxy servers and their role in security and privacy.
- Profect 3 (3 students)
Cryprographic protocols secure against MITM attacks.