Can an attacker sniff the encryption details when connecting to a VPN? [duplicate]

I thought I would be protected from sniffing if I use a VPN, even in a setting where my traffic is going through a «man-in-the-middle» either by ARP poisoning or an evil twin attack.
Now I was told, that when connecting to the VPN the init… Continue reading Can an attacker sniff the encryption details when connecting to a VPN? [duplicate]

Why do I need promiscuous mode? Can I not sniff without promiscuous mode? [closed]

It says on sources that promiscuous mode is required to sniff traffic that is not intended for corresponding NIC.

Network adapters with promiscuous mode can’t accept unicast traffic
intended for other VMs or traffic between other VMs with… Continue reading Why do I need promiscuous mode? Can I not sniff without promiscuous mode? [closed]

how to use a self signed certificate to intercept traffic in MITM attack [closed]

We have a project at university about MITM attacks and our focus is to show how one can get into the communication between two endpoints, given different circumstances and security measures (that we decide).
Since I don’t have much knowled… Continue reading how to use a self signed certificate to intercept traffic in MITM attack [closed]

How can authoritarian governments sniff TLS encrypted traffic on mass scale?

I tried sniffing TLS web traffic on my own network and I always run against the following complications:

I need to install an additional root cert on my devices
I need to root my phone to do certificate pinning bypass

For a government th… Continue reading How can authoritarian governments sniff TLS encrypted traffic on mass scale?