VDZ wrote:shubla wrote:Spoofing attack is so easy to do that its a real threat.
But it isn't. Pulling off a MITM attack by itself is pretty hard already, managing to spoof traffic adds a further layer of complication, and actually doing it convincingly is actually very difficult. I can't go into details because NDAs and such, but I'm a reverse engineer (purely software, I don't actually deal with network tampering) and have to work on adding compatibility layers/spoofing results every now and then. It often seems simple but there are so, so many things you can do wrong and every tiny mistake is likely to cause the whole thing to come crashing down - and that's typically without security measures in place to prevent tampering. That's usually fine when working with local software (you just sigh, restart the program and get it back into the state you were working on) but incredibly complicated when one half of the equation is not under your control (you just have to hope your target's environment is sufficiently similar to the environment you tested it on). If there's also the fact that you can get arrested for screwing up then you're really playing with fire.
Yeah very hard XD Like using a common vulnerability to infect router of a player (which almost nobody will update their software on, unless its a managed service). And now normal websites that have normal certificate and HSTS enabled are still safe while this one is not. Simplest example of your SUPER COMPLEX attack. You don't need to reverse a thing. And reverse engineering expertise in here has nothing to do with the topic.