↧
Transparent Connection Interception Trick
Now when I have a blog for half a year I figured I should post something. So here goes description of using Linux (Ubuntu in my case) bridge configured to redirect selected TCP connections to...
View ArticleSSH Man-in-the-Middle Attack and Public-Key Authentication Method
SSH is a protocol for secure remote login and other secure network services over insecure networks. To detect man-in-the-middle attacks SSH clients are supposed to check the host key of the server, for...
View ArticleTapping 802.1x Links with Marvin
While testing fat clients and appliances for resistance against man-in-the-middle attack I always had to mess with iptables/ebtables/socat to divert network connections. It is enough in most cases, but...
View Article