Browsing tag

MitM attacks

Google to Block Sign-ins from Embedded Browser Frameworks

In a bid to improve its phishing protections and to protect users from MITM attacks, Google has come up with a new move- a decision to block users sign-in using Embedded browser frameworks. GBHackers on Security reports, “Google announced a new security update to block users sign-in using Embedded browser frameworks in order to improve […]

Man-in-the-Middle (MITM) Attacks: An Introduction

What is a Man-in-the-Middle (MITM) Attacks – Definition MITM attack refers to the kind of cyberattack in which an attacker eavesdrops on the communication between two targets- two legitimately communicating hosts- and even hijacks the conversation between the two targets. Thus, the attacker is able to “listen” to a conversation that he is not supposed […]

Perl devs fix an important flaw in DBD—MySQL that affects encryption between client and server

Perl development team solved a flaw in DBD—MySQL in some configurations that wasn’t enforcing encryption allowing an attacker to power MiTM attacks. The security researcher Pali Rohár reported an important flaw in DBD—MySQL, tracked as CVE-2017-10789, that affects only encryption between client and server. According to the expert, the issue in some configurations wasn’t enforcing encryption allowing an attacker to power […]

Confide App used by White House staffers Found Vulnerable for MITM attacks

Confide is an a encrypted texting application for Android and iOS, which used by staffers in White House for their secret communication. Security Experts from IOActive found Multiple critical flaws while testing versions 4.0.4 for Android and 1.4.2 for Windows and OS X. Technical Details Notification system doesn’t require a valid SSL server certificate to communicate, which would leak […]

Automated Ettercap TCP/IP Hijacking Tool – Morpheus

Morpheus is a framework tool which automates TCP/UDP packet manipulation tasks by using etter filters to manipulate target requests/responses under MitM attacks replacing the TCP/UDP packet contents by our contents before forward the packet back to the target host. t will be as simple as Occidental; in fact, it will be Occidental. To an English […]