- Jan 19, 2015
- 230
ADDED: Private Internet Access VPN.
I'm going to be using a lot of public wifi at my library in the coming times, so I need a VPN. Also, for reasons completely unknown to me, one of my favorite online games uses an UNSECURED http connection to send login information when logging in so a VPN being doubly important there. How do I know for sure it's an unsecured connection? Well, to test it, I used Kali Linux on one of my computers to do a MiTM attack on another of my computers (don't worry, I did this to my own computer in my own home)... just a basic, ettercap + urlsnarf MiTM. No certificate tampering, just a very basic ettercap MiTM. I logged into the game on the victim computer and was very easily able to see my own log in information with the attacking computer. Again, I did not tamper with SSL certificates to read encrypted traffic, nor did the game website on the victim computer ever throw a certificate warning (usually when you are the victim of an attack like this, the browser will give you a certificate error, unless there was certificate tampering (such as the weakness with SHA1 where you could fool the browser into still thinking the connection was legitimate, thus not providing a warning), but like I said, there was no certificate tampering, no warnings... just plaintext traffic containing my precious log in details ).
I'm going to be using a lot of public wifi at my library in the coming times, so I need a VPN. Also, for reasons completely unknown to me, one of my favorite online games uses an UNSECURED http connection to send login information when logging in so a VPN being doubly important there. How do I know for sure it's an unsecured connection? Well, to test it, I used Kali Linux on one of my computers to do a MiTM attack on another of my computers (don't worry, I did this to my own computer in my own home)... just a basic, ettercap + urlsnarf MiTM. No certificate tampering, just a very basic ettercap MiTM. I logged into the game on the victim computer and was very easily able to see my own log in information with the attacking computer. Again, I did not tamper with SSL certificates to read encrypted traffic, nor did the game website on the victim computer ever throw a certificate warning (usually when you are the victim of an attack like this, the browser will give you a certificate error, unless there was certificate tampering (such as the weakness with SHA1 where you could fool the browser into still thinking the connection was legitimate, thus not providing a warning), but like I said, there was no certificate tampering, no warnings... just plaintext traffic containing my precious log in details ).