SSL Pinning Explained

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 25

  • @VictoriaOtunsha
    @VictoriaOtunsha 2 года назад +5

    Thank you for the very in-depth breakdown, it gave me a better understanding of the whole thing.

  • @isurujn
    @isurujn 3 года назад +3

    Very nice technically in-depth video. Also it was a pleasant surprise to see Objective-C in a video from 2021 haha.

  • @itsmmdoha
    @itsmmdoha 2 года назад +2

    High-quality stuff!
    Love it.

  • @noursalman932
    @noursalman932 Год назад +1

    Amazing thorough explanation, really appreciated!

  • @mutantx981
    @mutantx981 5 месяцев назад

    Hi! In the first attack you made, you said you repackaged the app. That means that user has to reinstall the app. So you can only do the attack if you have access to the actual device, correct?
    Nice explanation btw I really enjoyed it!

    • @Guardsquare
      @Guardsquare  5 месяцев назад

      Thank you for your question! When talking about MiTM attacks, most people will understand it as a network attack where the attacker intercepts traffic from a victim (there are different ways to do so) and eavesdrops on the communication. The goal for the attacker is to listen in on data such as logins, or even edit data such as payments that are made. There's already a lot of techniques to prevent this e.g. browsers have built-in security features warning the users about this and SSL Pinning (without hardening from DG/iXG) will be enough.
      However, when we're talking about reverse engineering the idea is that the attacker performs a MiTM attack on their own device to listen in how the app communicates with its servers. The goal is to get a better understanding on how the server and app work together. This information can be used to plan a larger attack e.g. customized (modded) apps that make use of the service with additional features which are not desired by the app's developers, cheat in games, bypass license checks, etc.

  • @DP-qe2xo
    @DP-qe2xo 7 месяцев назад +1

    very clear explanation, thank you

  • @willyrosahuanca5884
    @willyrosahuanca5884 2 года назад

    The first attack u tried is one of the two approaches in minute 3:21? or this proxy server attack showed is another approach? can u please tell me how to run that first proxy server attack? Nice video

  • @Iksjsisjshjanagsh
    @Iksjsisjshjanagsh 3 года назад +3

    😎

    •  3 года назад +1

      Gjmo de vdd vc v.

  • @iiiiankkk
    @iiiiankkk 3 года назад +7

    top😀

  • @dm-vh9yu
    @dm-vh9yu 3 года назад +1

    No way this guy is a real person lmfao

  • @seymayorulmaz2096
    @seymayorulmaz2096 3 года назад

    🥰😍🥰😍🥰😍😘😍😘

    • @edenronald8991
      @edenronald8991 3 года назад

      A tip : you can watch series at Kaldrostream. I've been using them for watching lots of of movies these days.

    • @oscarkody2753
      @oscarkody2753 3 года назад

      @Eden Ronald definitely, have been watching on Kaldrostream for since november myself :)

  • @robsonferreiradealmeidasob9466
    @robsonferreiradealmeidasob9466 3 года назад

    Uug

  • @robertosilva1821
    @robertosilva1821 3 года назад

    Eu gosto de muito de jogo Robin Hood Robin Hood que eu gosto Robin Hood

  • @carlabeatrizlaranjeira5577
    @carlabeatrizlaranjeira5577 3 года назад +1

    Nada ver é english

  • @vitor4846
    @vitor4846 3 года назад +4

    Legal :D