Who is my phone talking to (setting up a man-in-the-middle attack)
Workshop by Domen Puncer Kugler
Friday from 3:20 PM - 4:50 PM in Workshop 3
Want to see what unencrypted data your devices are sending? What about encrypted? Can you change that data? Whether you're reverse engineering an app, want to annoy people (who gave you the permission for this!), or are just curious about data exchanged with your device, this might be useful for you. After a short introduction to networking, we'll create a basic MITM (man-in-the-middle) setup with your laptop. Your laptop will become a WiFi access point and target devices will connect to it. Network traffic will be inspected (wireshark) and also changed (dnsmasq, mitmproxy). We'll also install a custom CA on the phone to see HTTPS packets. You will need a laptop with WiFi and Ethernet interfaces, and it needs to run Linux non-virtualised. You should be comfortable doing basic admin on your Linux machine. Tools we will use: wireshark, mitmproxy, dnsmasq. After the workshop, try it out yourself at home on a TV, toaster, or other networked device.
|Attending this workshop will cost||Free|
|Suitable age range||All ages|
|Attendees should bring||Laptop running Linux natively (not virtualised) with WiFi + ethernet network interfaces. Smartphone or other networked device.|
If you would like to mark this as a favourite please log in.