Hello and Salam to everyone ,
I love to share my ideas and experiments , experience with peoples and today i am sharing the proof of concept on Server side MITM attack yes , i know you have not heard it before right but it is a vulnerability in which attacker can trick the user and can steal the user credentials.
We know that in MITM attack aka Man in the middle attack , attacker steals the user credentials like username and password right ? in many conditions attacker or hacker performs this attack such as in the condition a website is running on HTTP and there is a login form which deals with the important information sent from Client side to server side and attacker which is a third person can steal this because of the HTTP in this state HTTPS must be enforced on the website to avoid the MITM attack.
Now many big organizations running their website just enable HTTPS on their website but the point is they must enforce the HTTPS if they will just enable the HTTP the attacker can open website in both conditions in HTTP and also HTTPS while if attacker opens a website in HTTP he must be redirected to HTTPS as stated it must be enforced on the webpage.
While in another case here comes the Server side MITM attack , yes there are many other websites which are running on HTTPS and also HTTPS are enforced but what if we access the website directly from their IP address ? and what if the website is directly accessiable from the IP ? and also what if there is No HTTPS enabled or enforced on the IP ? yes you got my point.
Let me give you live example :-
lets ping google.com and we will get the ip address " google.com [216.58.209.238] " now we have the ip of the google.com and lets try to open it in browser rather than entering the domain.
Lel the google is opening directly from its ip address but not a big deal leet , check out again there are not HTTPS enabled or enforced on the ip address and no HTTPS means insecure transaction of data. And in many conditions a user can trick the user into his trap to steal the information through MITM attack. eg cloning the url like click on the that url --> www.google.com or in many other conditions.
So in such state the administrator of the website must consider upon 2 things to avoid this and to make high and end security in which....
Hope you got the point. Happy Hacking.
Regards :-
Ahmed Mehtab
I love to share my ideas and experiments , experience with peoples and today i am sharing the proof of concept on Server side MITM attack yes , i know you have not heard it before right but it is a vulnerability in which attacker can trick the user and can steal the user credentials.
We know that in MITM attack aka Man in the middle attack , attacker steals the user credentials like username and password right ? in many conditions attacker or hacker performs this attack such as in the condition a website is running on HTTP and there is a login form which deals with the important information sent from Client side to server side and attacker which is a third person can steal this because of the HTTP in this state HTTPS must be enforced on the website to avoid the MITM attack.
Now many big organizations running their website just enable HTTPS on their website but the point is they must enforce the HTTPS if they will just enable the HTTP the attacker can open website in both conditions in HTTP and also HTTPS while if attacker opens a website in HTTP he must be redirected to HTTPS as stated it must be enforced on the webpage.
While in another case here comes the Server side MITM attack , yes there are many other websites which are running on HTTPS and also HTTPS are enforced but what if we access the website directly from their IP address ? and what if the website is directly accessiable from the IP ? and also what if there is No HTTPS enabled or enforced on the IP ? yes you got my point.
Let me give you live example :-
lets ping google.com and we will get the ip address " google.com [216.58.209.238] " now we have the ip of the google.com and lets try to open it in browser rather than entering the domain.
google MITM attack |
Lel the google is opening directly from its ip address but not a big deal leet , check out again there are not HTTPS enabled or enforced on the ip address and no HTTPS means insecure transaction of data. And in many conditions a user can trick the user into his trap to steal the information through MITM attack. eg cloning the url like click on the that url --> www.google.com or in many other conditions.
So in such state the administrator of the website must consider upon 2 things to avoid this and to make high and end security in which....
- Redirect the direct ip access to the domain
- Enable and Enforce HTTPS on the direct IP address
Hope you got the point. Happy Hacking.
Regards :-
Ahmed Mehtab
Thanks for this tips!
ReplyDelete:) keep visiting and share if you liked it
DeleteAwesome Post with much research
Deletethank you dear ,, check other articles and share if you liked
Deletenot understand :/
ReplyDeleteNice artical bro thumbs up....
ReplyDeletethank you dear ,, check other articles and share if you liked
Deletenice work man ;)
ReplyDeletethank you dear ,, check other articles and share if you liked
Deletenice work
ReplyDeletenice blog admin
ReplyDeletethanks admin for this content really helped me
ReplyDeleteThanks for sharing, have u an anonymously email?
ReplyDelete
ReplyDeleteI have read so many content on the topic of the blogger lovers however this piece of writing is actually a nice paragraph, keep it up.
melissa sue anderson
david bromstad partner
Hentai App
appvalley vip
gogo anime
Selling USA FRESH SPAMMED SSN Leads/Fullz, along with Driving License/ID Number with EXCELLENT connectivity.
ReplyDelete**PRICE**
>>2$ FOR EACH LEAD/FULLZ/PROFILE
>>5$ FOR EACH PREMIUM LEAD/FULLZ/PROFILE
**DETAILS IN EACH LEAD/FULLZ**
->FULL NAME
->SSN
->DATE OF BIRTH
->DRIVING LICENSE NUMBER WITH EXPIRY DATE
->ADDRESS WITH ZIP
->PHONE NUMBER, EMAIL, I.P ADDRESS
->EMPLOYEE DETAILS
->REALTIONSHIP DETAILS
->MORTGAGE INFO
->BANK ACCOUNT DETAILS
>All Leads are Tested & Verified.
>Invalid info found, will be replaced.
>Serious buyers will be welcome & I will give discounts for bulk orders.
>Fresh spammed data of USA Credit Bureau
>Good credit Scores, 700 minimum scores
>Bulk order will be preferable
>Minimum order 20 leads/fullz
>Hope for the long term business
>You can asked for samples, specific states & zips (if needed)
>Payment mode BTC, PAYPAL & PERFECT MONEY
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040
''OTHER GADGETS PROVIDING''
>Dead Fullz
>Carding Tutorials
>Hacking Tutorials
>SMTP Linux Root
>DUMPS with pins track 1 and 2
>Sock Tools
>Server I.P's
>USA emails with passwords (bulk order preferable)
**Contact 24/7**
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040
Very Fresh, Legit & Genuine Stuff available now
ReplyDeleteFreshly spammed from HIGH INCOME Databases
USA, UK, Canada States available
All info included SSN/SIN DOB DL
Fullz will be high credit scores 680 to 700+
Stuff will be fresh, never sold before
+92 3.1.7 2.7.2 1.1.2.2 WhatsApp/Tele-gram
7.5.2.8.2.2.0.4.0 I.C.Q
@peeterhacks Skype&WickrMe
exploit dot tools4u at gmail dot com
CC FULLZ with CVV's
DUMPS with Pins
Combos
Logs
Office365 Emails & Logs
Spamming Tools & Tutorials (SMTP's, RDP's, C-panels, Brutes, Scripting, etc)
Ha-cking stuff with complete tools, Guides, Ebooks & guidance
Carding fresh Methods, Loan Methods, Carding Cash-out Methods
Carding Tutorials, Transfers, top-up's
Kali Linux with Termex & Python
Keyloggers, Shells, RAT's
I.p's, Proxies, Server I.p's
Many other stuff we can provide on demand
Here we're
@killhacks ICQ&Tele.gram
+92 317272 1122 WhatsApp