Hacker   12403

« earlier    

Does your employer run SSL MiTM attacks on you? · fak3r
So, does your employer run SSL MiTM attacks on you? Take a closer look at the SSL certs you get when you load an HTTPS page and see what you can find.

they might have seen a EULA or other notice stating that the company owns everything, but for years we have trained users that if they use HTTPS and they see that ‘Lock’ that they have end-to-end encryption, they have privacy, but they don’t know that this can be completely false if the company is using an appliance that circumvents that functionality and silently installs a hand-made, bogus Root CA to lie to them.

Point is, since I’m not running Windows I’m not getting the system administering setups, so I didn’t recieve their fake Root CA to validate sites for me blindly. I know I’m an edge case here, but sometimes that’s what you need to learn about what’s really going on.
ssl  https  mitm  security  hacker 
4 days ago by hellsten
byt3bl33d3r/MITMf: Framework for Man-In-The-Middle attacks
MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques.

Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely re-written from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack.
hacking  hacker  security  mitm 
9 days ago by hellsten
Mithering about the unmodellable
All the data from all the applications was thrown into a triple store, seemingly along with an expectation that somehow it would all magically reconcile and interconnect. data.parliament runs on a triple store, but no-one designed a data model (or ontology, if you will) for it. Silver and I spent some time attempting to reverse engineer a data model out of the data we found. We came up with this picture. If you squint hard enough you can see the shapes of individual offices in Parliament. The division data is connected to the people doing the dividing, but not to the motion or motion amendment or bill amendment the division was on.
parliament  rdf  hacker  organisations 
10 days ago by yorksranter
RE for Beginners | Reverse Engineering
If you have been searching for a place to get started with
Reverse Engineering and get your hands dirty - you are in the right place :)
hacking  reverse-engineering  hacker 
13 days ago by hellsten
"Reverse Engineering for Beginners" free book
If you have been searching for a place to get started with Reverse Engineering and get your hands dirty - you are in the right place :)
book  security  reverse-engineering  hacking  hacker 
13 days ago by hellsten

« earlier    

related tags

2016  2017  2018  80000-hours  a  ac  activism  after  agency  aggregator  agriculture  ai-control  ai  air  alignment  altair  alternative  altgdp  analysis  anarchism  and  antifragility  antivirus  app  archive  arms  art  artificialintelligence  artist  assembly  attacks  auditioning  automation  axios.com  backdoor  bari  bbs  benraylujan  best  bestpractices  bitcoin  blog  book  books  bootloader  bostrom  browser  career  cbsnews.com  cell  checklist  china  chrome  chromebook  chromeos  cia  cis3360  cis4615  civichacking  cli  clinton  co-design  code  coding  communities  community  competition  computer  computing  conditioning  content  cool  cooling  cooperate-defect  coordination  copyright  corruption  cracker  cracking  crime  culture  cyber_security  cyber_warfare  cyberattacks  cyberpunk  cybersecurity  d3  dailyintell  dat  data  database  dating  davidburgess  dccc  deepfakes  definition  demo  democrat  deschooling  design  deterrence  development  dictionary  digital  discussion  diy  django  dnc  dns  documents  donaldtrump  download  dupe  dynamic-programming  e10  e2018  ebook  ebooks  economics  edv  edwardsnowden  eeeuw  efail  effect  effective-altruism  ejuli  election  election2016  election2018  electron's  email  emails  emulation  emulator  env  espionage  ethics  exploit  expose  fabrication  facebook  fake  fakenews  fan  fans  fbi  feedly  firmware  fonts  food  foreign-policy  forgery  forum  france  fun  game-theory  games  gaming  gdpr  geek  gizmodo.com  glvo  google  gop  got...  got  government  growth  gsm  guide  hack  hacked  hacker  hackerethics  hackernews  hackerspace  hackerspaces  hackerterms  hacking-as-a-service  hacking  hardware  heating  history.  history  hn  hobbyist  home  homeland  homepage  hopehicks  house  html_email  https  illustration  information  infosec  internals  internet  interview  into  ios  iot  ip  irc  is  israel  italia  italy  its  japan  java  javascript  jm  job  journalism  jupyter  jvm  knowledge  kodi  korea  kubernetes  labor  lang:fr  language  law  lawyers  lcproject  leak  learning  learningbydoing  lifehack  linux  machine  machinelearning  maker  makerspace  manifesto  marketing  math  media  memory  messageboard  mitm  multiverse  nes  network  networking  news  newspapers  nicholas_kristof  nintendo  non-linear  nonlinear  north  northkorea  nrcc  nsa  nsc  ocaml  offline  opensource  openstudioproject  organisations  orm  osmocom  osmosis  ovum  panama  papers  paris  parliament  pentagon  people  person  personal  pgp  philosophy  phones  piracy  pirates  planning  podcasts  police  policy  polisci  politico  portfolio  practices  programmer  programming  projects  putin  python  q3  radio  ratty  rdf  recommendation  recommendations  republican  resuse  reverse-engineering  risk  rnc  robertmuller  rollcall  russia  scandals  scanner  scary  scene  scrape  sdr  search  searchengine  security  sharing  shell  showcases  sicherheit  slang  snowden  social-science  software  source  space  spy  ss7  ssl  staffers  stalk  stevenmnuchin  stolen  strategy  subculture  sysadmin  team  techcrunch  technology  ted  terminal  terms  texas  textfile  textfiles  theatlantic  ticketfly’s  tinder  to-watch  tool  toolkit  tools  trade  treasury  trump  twitter  ukraine  underground  unschooling  upnp  uproxx.com  urban  usa  usb  video  virtual  virtualenv  visualization  vox.com  wapo  warez  washington  web  website  wikileaks  wikipedia  work  wsj  wysiwyg  yatebts     

Copy this bookmark: