MITM suspicion. How to identify intervening computers/network/server and bypass?

Discussion in 'other security issues & news' started by Thelps, May 13, 2018.

  1. Thelps

    Thelps Registered Member

    Joined:
    Apr 1, 2012
    Posts:
    46
    Been suspicious for a while now that someone has engineered a 'Man-In-The-Middle'-type communications-interception between this computer and its ISP.

    How could I identify the intervening network that is intercepting and adulterating data and bypass it?

    VPNs don't seem to be an effective option as if they're persistent enough to MITM these communications then they'll be willing to decipher encryption.

    Your assistance much appreciated.
     
  2. SouthPark

    SouthPark Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    737
    Location:
    South Park, CO
  3. guest

    guest Guest

    try SSL-Eye
     
  4. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    This is a great solution IF the OP understands why its the way to go. OP seems to dismiss the VPNs as a way to secure and be certain a MITM is removed (assuming its there at all). The VPN (if its any good at all) will publish the client fingerprint during connection. There is no way a MITM can produce those fingerprints. During connection you can view the process and confirm the fingerprint is a match. Once connected the VPN client and your firewalls can be CERTAIN that no traffic comes in or out of the machine except through the VPN. I go as far as to only allow one specific "off beat" port and only using one specific protocol as well. All else is blocked and doesn't exist at all. You can isolate your network, but of course operator error can always presented by inexperienced "click all" users if you have those on the network. You can control those too but its outsisde of the OP's initial question.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Here's a good article on MITM: https://securitygladiators.com/man-in-the-middle-attacks/

    Remember that Chrome, Firefox, and Opera all support public key pinning i.e. PKP which automates the GRC fingerprinting manual check. Also as noted in the article, VPNs do provide excellent protection against MITM interception.

    EMET had a certificate pinning feature that allowed IE the same capability although setup was burdensome and it only alerted to such activity and did not block the connection. Since EMET is no longer supported in Win 10, "you're left blowing in the wind" as far as IE and Edge go in this regard.
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.