A few words of praise for mitmproxy. This useful tool lets you monitor TLS-encrypted communications from a device, provided you can install a trusted Certificate Authority (CA) key on it (and provided the application on the device accepts TLS certificates signed by this CA key). The idea is that TCP traffic from the device, and HTTP traffic in particular, is routed through mitmproxy. Whenever… View More
March 2018
Post 1 to 2 of 2
Recently, Mathy Vanhoef from the University of Leuven published, with his supervisor Frank Piessens, a Key Re-initialisation Attack on WPA/WPA2. This was significant because these standards are so widely used, and also because there were proofs of strength for the the protocol they attacked (in models which consequently are shown to be inadequate). WPA and WPA2 are very… View More