How can someone on the same GPON splitter network sniff my internet traffic?

I currently have a fiber optic internet connection at home. My ISP uses GPON where the ONU acts as a gateway device which has a direct fiber optic connection to it. ONU is a Huawei HG8145V5.
I understand that downstream network traffic in … Continue reading How can someone on the same GPON splitter network sniff my internet traffic?

Intercept and modify Server-Sent Events (EventSource API)

I’m working with a web application using Server-Sent Events (SSE, EventSource API), similar to WebSockets. However, none of the commonly penetration test tools seem to fully support this.
I’ve tried Burp Professional, OWASP ZAP and mitmpro… Continue reading Intercept and modify Server-Sent Events (EventSource API)

How to prevent server know what data is being transferred through it between two clients

Imagine a web application in which two computers can communicate with each other by transferring files, through the server linked with some unique password.
Every file sent between the clients are sent through the server, means that the se… Continue reading How to prevent server know what data is being transferred through it between two clients

With Network Security Systems Decrypting SSL traffic to scan for Malware Is Server-Side hashing of Credentials Still Enough?

I am not a Security Expert by any means. Nor am I a Cryptographer. That’s why I’m here.
After discovering that the server side of some software I work on was operating on plain text passwords (though I later determined that only the hash w… Continue reading With Network Security Systems Decrypting SSL traffic to scan for Malware Is Server-Side hashing of Credentials Still Enough?

How vulnerable is security if a public key is swapped by active attacker if a key check is done?

Trying to understand this from a high level conceptually. It is obvious from all information on Asymmetric encryption that a public key can be of course, public and there isn’t a danger of interception. So I’m faced with a point in my soft… Continue reading How vulnerable is security if a public key is swapped by active attacker if a key check is done?