Have I just experienced a MitM attack or is my ISP updating my hardware without my permission? [closed]

I was casually surfing the web when suddenly the antivirus on my laptop started warning on supposed ARP Spoofing attacks coming from my router’s IP, which got blocked.
The internet on my phone continued to work completely fine, but on my l… Continue reading Have I just experienced a MitM attack or is my ISP updating my hardware without my permission? [closed]

Can a Man-in-the-Middle-Attack be achieved by adding a cloudfront distribution origin of a domain not owned by me?

Cloudfront supports adding external origins, i.e. domains that are not S3 buckets or ALBs. This led me to wonder whether adding domains that are not owned by the entity as an origin could allow for intercept the request payload, and potent… Continue reading Can a Man-in-the-Middle-Attack be achieved by adding a cloudfront distribution origin of a domain not owned by me?

SSL stripping – how is it possible to send back the HTTP page? [duplicate]

Been trying to wrap my head around SSL stripping.
An explanation here writes:

Keep in mind, however, that when you install SSL, you’re essentially creating a duplicate of your website with HTTPS URLs. Those original HTTP URLs still exist,… Continue reading SSL stripping – how is it possible to send back the HTTP page? [duplicate]

How Data Link layer trailer prevents data from being intercepted and tampers

I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model.
It said that Data Link layer trailer can increase security as the data can’t be intercepted and tampered. How can it do it?. If it is because of t… Continue reading How Data Link layer trailer prevents data from being intercepted and tampers

How does https block the man in the middle from just forwarding the certificate chain? [duplicate]

Suppose I have a client : Alice and a server: Bob
A —- B
There is a Charles in between.
A —– C —– B
When Alice asks for bob’s public key and certificate. Charles can intercept this and form a new connection to Bob get his public ke… Continue reading How does https block the man in the middle from just forwarding the certificate chain? [duplicate]