Who is my phone talking to (setting up a man-in-the-middle attack)
A workshop from EMF 2018 by Domen Puncer Kugler
On Friday August 31, 2018 at – in Workshop 3
Want to see what unencrypted data your devices are sending? What about encrypted? Can you change that data?
Whether you're reverse engineering an app, want to annoy people (who gave you the permission for this!), or are just curious about data exchanged with your device, this might be useful for you.
After a short introduction to networking, we'll create a basic MITM (man-in-the-middle) setup with your laptop. Your laptop will become a WiFi access point and target devices will connect to it. Network traffic will be inspected (wireshark) and also changed (dnsmasq, mitmproxy). We'll also install a custom CA on the phone to see HTTPS packets.
You will need a laptop with WiFi and Ethernet interfaces, and it needs to run Linux non-virtualised.
You should be comfortable doing basic admin on your Linux machine.
Tools we will use: wireshark, mitmproxy, dnsmasq.
After the workshop, try it out yourself at home on a TV, toaster, or other networked device.