MITM Proxies

From: Kevin Willock (IGSN Security) (kevin@igsn.com)
Date: Fri Jan 20 2006 - 17:04:10 EST


Hi there, excuse my ignorance, but I am curious to know how MITM
applications bypass SSL encryption? Do you need to buy a CA signed
cert for the MITM machine? How does the spoofing process actually work?

Thanks

Kevin Willock
  IGSN Security
  415.462.1782
  403.870.1655

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:24 EDT