Jump to content


Photo
- - - - -

Mitm,binary Bait & Switch


  • Please log in to reply
No replies to this topic

#1 O.D.D

O.D.D

    Newbie

  • Members
  • 2 posts

Posted 23 March 2012 - 01:55 PM

Hi guys, I've been looking around the Internet and maybe I'm using the wrong search terms
but it strikes me that an attacker once a Man in the middle can interfere with an data.
When the victim starts a download of an executable, a .PDF or a .DOC the attacker could
switch the file with a Trojan, compromising the victim.

On the easy side you could switch any .exe with a prepared file that just gives you a
"not a valid windows 32 application" and exits after installing the payload.

On the more difficult side we could theoretical add payload on the fly. I've been looking
for something cool to develop and if there's nothing out there I might start working on this.
But if it already exists I don't want to waste my time.

So it this can be done it would be a cool topic for an episode, if not it would be a cool
topic for me. What do you guys think?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users