Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Beware! Billion of Android users can easily be tricked into changing their devices’ critical network settings with just an SMS-based phishing attack.

Whenever you insert a new SIM in your phone and connects to your cellular network for the very first … Continue reading Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Is this a threat if website to connect to is in clear in the TLS SNI extension or when using an HTTP proxy?

As per my understanding, after the TCP three-way handshake we send a TLS ClientHello which has the SNI field in clear text and anyone can see which website I am trying to connect to.

Isn’t it a threat that anyone can see my … Continue reading Is this a threat if website to connect to is in clear in the TLS SNI extension or when using an HTTP proxy?

Is this a threat if website to connect to is in clear in the TLS SNI extension or when using an HTTP proxy?

As per my understanding, after the TCP three-way handshake we send a TLS ClientHello which has the SNI field in clear text and anyone can see which website I am trying to connect to.

Isn’t it a threat that anyone can see my … Continue reading Is this a threat if website to connect to is in clear in the TLS SNI extension or when using an HTTP proxy?

Can charles proxy (with root cert installed) intercept and read all traffic between mobile app and server? [duplicate]

I have a mobile app that queries various 3rd party API/sites (these are https links). I have a concern that SSL proxies (e.g. Charles) can be used to intercept the traffic – man in the middle.

Are there any instances that charles would not ables to read the traffic?

It seems crazy to me that something basic like SSL proxy can undermine a well used technology – TLS.

What are my options to mitigate against a SSL proxy decrypting the traffic and possibly seeing sensitive information?

Would Public key pinning be a possible mitigation ? Anything else?

Continue reading Can charles proxy (with root cert installed) intercept and read all traffic between mobile app and server? [duplicate]

Why isn’t an Expect-CT violation report sent when I use a certificate generated with Burp Suite?

I wanted to test the Expect-CT security header. So I searched for sites and found that LinkedIn uses the Expect-CT header:

Expect-CT: max-age=86400, report-uri=”https://www.linkedin.com/platform-telemetry/ct”

I configured… Continue reading Why isn’t an Expect-CT violation report sent when I use a certificate generated with Burp Suite?