is MITM attack possible when we verify only the jump host’s fingerprint (host key)?

I am connecting to remote hosts via jump host where I verify only the jump host’s host key, but turn off host key verification for the target hosts.
the ssh command arguments look like this:
-o StrictHostKeyChecking=no -o ProxyCommand=&quo… Continue reading is MITM attack possible when we verify only the jump host’s fingerprint (host key)?

How to intercept network connection/requests of a desktop app on MacOS [closed]

Here is the situation I have in hands:
I have a desktop application with my data on it and I need to extract all of it to migrate it to a new application. There are thousands of customer files so doing it manually is really not an option. … Continue reading How to intercept network connection/requests of a desktop app on MacOS [closed]

What if there is a "man in the middle" between the client and the certification authority and the same MITM is also between Client and server? [duplicate]

I’ve read other some articles (including this: https://medium.com/@technospace/tls-handshake-under-the-hood-79d20c0020de) and similar questions but none exactly like this hypothetical scenario.
What if there is a "man in the middle&qu… Continue reading What if there is a "man in the middle" between the client and the certification authority and the same MITM is also between Client and server? [duplicate]