How to perform a MITM attack on SSH exploiting the Diffie Hellman key exchange

I have an open-ended project for a class and I picked to make a tool/use existing tools and applications to exploit the Diffie-Hellman key exchange to be able to inject, modify and delete messages that are transferred over an… Continue reading How to perform a MITM attack on SSH exploiting the Diffie Hellman key exchange

Why RSA is used in TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ciphersuite [duplicate]

I try to understand where the signature is used in TLS 1.2.
The ciphersuite of google.com is TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256. However, if I look at the certificate, I can find an ECDSA key but the signature algorithm is RSA. So I’m wondering what is the purpose of ECDSA ?

I know that ECDHE parameters are sent in a separate TLS message. ECDSA is perhaps used to sign these parameters with ECDSA ?

Also, can you confirm that if TLS_ECDH_ECDSA_WITH_xxx is used, ECDH parameters are not in the certificate but in a separate message right ?

Continue reading Why RSA is used in TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ciphersuite [duplicate]

Tor: Is a Diffie-Hellman key exchange being done over recipient of traffic?

As I was looking over Tor specifications and I noticed that when a circuit is generated then on each circuit’s node a Diffie-Hellman key exchange is being done over an encrypted path on each Node as the image shows bellow:

In other words:… Continue reading Tor: Is a Diffie-Hellman key exchange being done over recipient of traffic?

SSH key based login is not vulenerable to MiTM attack. Is it true?

I read somewhere that when using key based login instead of a password based login, it is not possible for a Man-in-the-Middle attack to happen.

This question is not about what is being more secure: key based login or password based login… Continue reading SSH key based login is not vulenerable to MiTM attack. Is it true?