Can a VPN company perform a MiTM attack if SSL Pinning is in place?

Recently, I read news about Facebook acquired the Onavo VPN company to monitor Snapchat users’ traffic. It seems they executed a Man-in-the-Middle attack by replacing the certificate. But could they have executed the same attack if Snapcha… Continue reading Can a VPN company perform a MiTM attack if SSL Pinning is in place?

Does TLS interception necessarily require a self-signed certificate? Please explain why

A brief schema of a TLS intercepting proxy – the Client connects to the Host via the Proxy in a way which allows the Proxy to perform a (consensual) MITM.
[Client] -> [Proxy] -> [Host]

It’s my understanding reading references on… Continue reading Does TLS interception necessarily require a self-signed certificate? Please explain why

How can I enhance the security of SSL pinning in my mobile app to prevent certificate exposure?

For example, let’s say my backend address is api.xyz.com, and I have a mobile application. This application sends requests to api.xyz.com. The application employs SSL pinning, where it pins the certificate it easily obtained from api.xyz.c… Continue reading How can I enhance the security of SSL pinning in my mobile app to prevent certificate exposure?

Decrypting TLS traffic from windows desktop application [closed]

I have a desktop application on Windows that connects to a server which I don’t have access to. I want to reverse engineer an API for personal use so I can connect from a custom interface instead of using the official application.
Using Wi… Continue reading Decrypting TLS traffic from windows desktop application [closed]