Can you hide the initial exploit despite complete visibility into the network traffic?

When someone tries to exploit a vulnerability either by sending traffic to the device directly or by making users click on malicious attachments, drive by exploits or other ways, is it possible you miss the initial attack vector even when … Continue reading Can you hide the initial exploit despite complete visibility into the network traffic?

Needing help intercepting local SSL traffic on a difficult Android app

I’m trying to intercept traffic from an Andriod app.
I’ve forwarded ports 80, 443, 6699 and 6698 on Kali to a listener port and set up arp-spoofing. I’m using BurpSuite on the same computer to listen and intercept (invisible proxy).
Certif… Continue reading Needing help intercepting local SSL traffic on a difficult Android app