How can TLS/HTTPS remain secure if the entire transmission is monitored? [duplicate]

Okay, so I’m pretty sure this question comes from a fundamental misunderstanding of how HTTPS works, but here goes:

Say that someone has hooked into the “internet line” coming from your home so that they can view any data that is sent or received over it.

Now you type in your browser to visit https://secure.com.

  1. The client sends a client hello. Attacker and client know content.
  2. The server sends back a server hello. The attacker and client now know the cipher and certificate being used.
  3. The server sends the details needed for the client (and therefore the attacker) to generate the pre-master secret.
  4. The client and server (and attacker) generate a master secret that is then used for all further transmissions.
  5. Since the attacker knows everything the client knows, they can decrypt anything sent from the server to the client. (And I don’t know if they can decrypt vice-versa)

Since the attacker knows everything the client knows about the keys etc, can’t they see anything the client recieves?

How does HTTPS remain secure if all transmissions are monitored?

Continue reading How can TLS/HTTPS remain secure if the entire transmission is monitored? [duplicate]

I have a water heater with a wireless transmitter for changing the temp, how can I sniff the commands sent between them?

Long story short I’m automating a lot of my stuff at home and as part of that I’d like to be able to replicate the commands sent to my unit (https://www.rinnai.com.au/wp-content/uploads/2017/09/mc_503rc_operating_instructions… Continue reading I have a water heater with a wireless transmitter for changing the temp, how can I sniff the commands sent between them?

Drone Gives Up Its Wireless Secrets To Zigbee Sniffer

There’s something thrilling about decoding an unknown communications protocol. You start with a few clues, poke at the problem with some simple tools, and eventually work your way up to that first breakthrough that lets you crack the code. It can be frustrating, but when you eventually win, it can be very rewarding.

It seems that [Jason] learned this while decoding the wireless conversation between his mass-market quad and its controller. The quad in question, a Yuneec Q500, is one of those mid-range, ready-to-fly drones that’s targeted at those looking to get in the air easily and take some cool …read more

Continue reading Drone Gives Up Its Wireless Secrets To Zigbee Sniffer

How to identify the communication protocol used in a wireless device?

I really hope that this is the right place to ask.

I need to analyze a baby monitor for any security or privacy weaknesses.

The spec sheet of the baby monitor says, that it uses the ISM 2400~2483.5 MHz bands to transfer vid… Continue reading How to identify the communication protocol used in a wireless device?