How can one detect and mainly bypass TLS inspection as a user with an enterprise managed device?

Let’s assume Alice is an employee of the Chuck company.

Alice likes to communicate with Bob, a server somewhere in the internet.
Chuck, being a security orientated company, inspects all TLS connections from its devices by decrypting the t… Continue reading How can one detect and mainly bypass TLS inspection as a user with an enterprise managed device?

BURP SSL connection failing on Genymotion Virtual Device – Android 8.0 API 26

Everything earlier used to work fine. However, recently I downloaded a newer virtual device on Genymotion, which is an Android 8.0 API 26. I have been struggling to get HTTPS traffic intercepted on this device. Some digging suggested that … Continue reading BURP SSL connection failing on Genymotion Virtual Device – Android 8.0 API 26

How to mitigate credential disclosure in man in the middle attack

I have the followin scenario and looking for a secure solution.

There is a web application, hosted on IIS. The connection is established over TLS 1.2 and is encrypted.

So the steps are

Client connects to the server over ssl
Client send… Continue reading How to mitigate credential disclosure in man in the middle attack