most sites don't use HSTS, so you can SSLStrip and MITM internet access easily
-
-
this implies the user is "trusting WAN", yes, but most people don't even know what that means
1 reply 0 retweets 0 likes -
usually the expectation is that local WPA2 will protect against attacks on a local network, because attacking the uplink is harder
2 replies 0 retweets 0 likes -
same applies to a home network (but not to a public network with a public PSK, since you could just impersonate the AP anyway)
1 reply 0 retweets 0 likes -
and a lot of stuff on LAN _trusts the LAN_; sure, you can't transparently MITM those with wpa_supplicant, but you can impersonate
1 reply 0 retweets 0 likes -
Replying to @11rcombs
Sure, it's not zero impact by any means, but it's also not "I'm going to walk up to your office and sniff/MITM everything".
1 reply 0 retweets 0 likes -
Replying to @marcan42
well, you could walk up to an office and impersonate everything, which might be just as good
1 reply 0 retweets 0 likes -
Replying to @11rcombs
But I can already walk up to the office and impersonate the local Starbucks SSID and deauth people & MITM all your internet access too :-)
1 reply 0 retweets 0 likes -
Replying to @marcan42
…well played but yeah the solution is ultimately things like thispic.twitter.com/EVmgW19aLj
2 replies 0 retweets 0 likes -
also, did you see that Google's putting _TLDs_ in the HSTS preload list now like, ones it's intending to open to public registration
1 reply 0 retweets 0 likes
Yeah. Google knows how to troll security slackers.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.