Is SSL pinning bypass considered a vulnerability? If yes, what are the tightening/solution suggestions?

I’m a pentester and this is my first question here. I’ve managed to circumvent the ssl certificate pinning implementation on a few mobile apps.
Frankly, the applications I test are critical bank applications and I can listen to the traffic… Continue reading Is SSL pinning bypass considered a vulnerability? If yes, what are the tightening/solution suggestions?

How can authoritarian governments sniff TLS encrypted traffic on mass scale?

I tried sniffing TLS web traffic on my own network and I always run against the following complications:

I need to install an additional root cert on my devices
I need to root my phone to do certificate pinning bypass

For a government th… Continue reading How can authoritarian governments sniff TLS encrypted traffic on mass scale?

Could certificate pinning work if one checks the intermediate certificate when the leaf certificate already expired?

I have the following scenario:
When the leaf certificate expires, the intermediate certificate is checked and if the intermediate is not expired, the application will keep running and will not be affected, while the leaf is getting updated… Continue reading Could certificate pinning work if one checks the intermediate certificate when the leaf certificate already expired?

What is the best practice for relying parties to selectively trust certificates in a corporate pki hierarchy?

I have a pki infrastructure for internal company use.
In this pki there are multiple registration authorities whose responsibility is to.

receive certificate issuance requests
verify the identity of the user/device/entity requesting the c… Continue reading What is the best practice for relying parties to selectively trust certificates in a corporate pki hierarchy?

Is my understanding of Digital Certificates, Digital Signatures and their role in security of flowing traffic correct

I have followed this and this video. Following is my understanding.

Before sending a request/response, sending-host (could be server or client) generates a pair of asymmetric cryptographic keys, then takes hash (called Digest) of the pack… Continue reading Is my understanding of Digital Certificates, Digital Signatures and their role in security of flowing traffic correct