NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Forwarded from cRyPtHoN INFOSEC (EN)
Privacy International's data interception environment

This toolkit is built around a flaw that exists in the trust paradigm used extensively on the Internet. When secure connections are established such as HTTPS, the client checks against an internal store of "trust anchors" in its "trust store" known as certificate authorities (or CAs for short). CA's exist in most operating systems through a number of methods, predominantly commercial agreements. This toolkit introduces a CA that we add to the "trust store" (see step 5 and 6 above) which allows us to intercept secure traffic in transit, because the client now trusts this CA in addition to the preconfigured ones.

https://github.com/privacyint/appdata-environment-desktop/blob/master/README.md#privacy-internationals-data-interception-environment

#privacy #tools #mitm
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Kazakhstan's HTTPS Interception

This post describes our analysis of carrier-level HTTPS interception ordered by the government of Kazakhstan.

The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the attack, and in this post, we provide preliminary results from our ongoing research and new technical details about the Kazakh interception system.

👉🏼 Read more:
https://censoredplanet.org/kazakhstan

#kazakhstan #HTTPS #interception #websites #MitM #tracking #attack #research #analysis #facebook #twitter #google
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Let's Reverse Engineer Discord

How we reverse engineered Discord’s call protocol and found it being MITM-ed by Discord

Article, Comments

#discord #privacy #mitm
Hardware Security Threats Against #Bluetooth #Mesh Networks

https://ieeexplore.ieee.org/document/8433184/authors#authors

Security risks of Bluetooth

Man-in-the-middle attacks (#MITM):
Bluetooth connections can be susceptible to eavesdropping attacks if strong encryption is not used. Older Bluetooth versions (before 4.2) are particularly risky.

#Bluejacking & #bluesnarfing:
Attackers could try to send unwanted messages (bluejacking) or even steal data from devices (bluesnarfing).

Traceability:
Bluetooth devices often send unique #MAC addresses, which makes users traceable.

Weak standard pairing methods:
Many devices still use simple PINs or confirm connections without verification (e.g. "Just Works" mode with Bluetooth LE).

Risks specific to Bluetooth mesh networks

Mesh networks increase the attack surface:
Each device in the mesh acts as a relay, which means that a compromised device could influence the entire data traffic.

Lack of end-to-end encryption:
If the app/software does not implement additional encryption, messages can be forwarded in plain text.

Decentralized management:
Without centralized control, it is difficult to identify and remove malicious nodes.