SSL Pinning Explained

  Рет қаралды 144,466

Guardsquare

Guardsquare

Күн бұрын

Пікірлер: 25
@VictoriaOtunsha
@VictoriaOtunsha 2 жыл бұрын
Thank you for the very in-depth breakdown, it gave me a better understanding of the whole thing.
@itsmmdoha
@itsmmdoha 2 жыл бұрын
High-quality stuff! Love it.
@isurujn
@isurujn 3 жыл бұрын
Very nice technically in-depth video. Also it was a pleasant surprise to see Objective-C in a video from 2021 haha.
@noursalman932
@noursalman932 Жыл бұрын
Amazing thorough explanation, really appreciated!
@willyrosahuanca5884
@willyrosahuanca5884 2 жыл бұрын
The first attack u tried is one of the two approaches in minute 3:21? or this proxy server attack showed is another approach? can u please tell me how to run that first proxy server attack? Nice video
@DP-qe2xo
@DP-qe2xo 9 ай бұрын
very clear explanation, thank you
@mutantx981
@mutantx981 7 ай бұрын
Hi! In the first attack you made, you said you repackaged the app. That means that user has to reinstall the app. So you can only do the attack if you have access to the actual device, correct? Nice explanation btw I really enjoyed it!
@Guardsquare
@Guardsquare 7 ай бұрын
Thank you for your question! When talking about MiTM attacks, most people will understand it as a network attack where the attacker intercepts traffic from a victim (there are different ways to do so) and eavesdrops on the communication. The goal for the attacker is to listen in on data such as logins, or even edit data such as payments that are made. There's already a lot of techniques to prevent this e.g. browsers have built-in security features warning the users about this and SSL Pinning (without hardening from DG/iXG) will be enough. However, when we're talking about reverse engineering the idea is that the attacker performs a MiTM attack on their own device to listen in how the app communicates with its servers. The goal is to get a better understanding on how the server and app work together. This information can be used to plan a larger attack e.g. customized (modded) apps that make use of the service with additional features which are not desired by the app's developers, cheat in games, bypass license checks, etc.
@wlsheikk7
@wlsheikk7 3 жыл бұрын
top😀
@suyantositi1675
@suyantositi1675 3 жыл бұрын
1r
@Iksjsisjshjanagsh
@Iksjsisjshjanagsh 3 жыл бұрын
😎
3 жыл бұрын
Gjmo de vdd vc v.
@seymayorulmaz2096
@seymayorulmaz2096 3 жыл бұрын
🥰😍🥰😍🥰😍😘😍😘
@edenronald8991
@edenronald8991 3 жыл бұрын
A tip : you can watch series at Kaldrostream. I've been using them for watching lots of of movies these days.
@oscarkody2753
@oscarkody2753 3 жыл бұрын
@Eden Ronald definitely, have been watching on Kaldrostream for since november myself :)
@dm-vh9yu
@dm-vh9yu 3 жыл бұрын
No way this guy is a real person lmfao
@robertosilva1821
@robertosilva1821 3 жыл бұрын
Eu gosto de muito de jogo Robin Hood Robin Hood que eu gosto Robin Hood
@robsonferreiradealmeidasob9466
@robsonferreiradealmeidasob9466 3 жыл бұрын
Uug
@carlabeatrizlaranjeira5577
@carlabeatrizlaranjeira5577 3 жыл бұрын
Nada ver é english
@vitor4846
@vitor4846 3 жыл бұрын
Legal :D
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
How to treat Acne💉
00:31
ISSEI / いっせい
Рет қаралды 108 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 153 М.
SSL/TLS Explained in 7 Minutes
7:38
Sematext
Рет қаралды 57 М.
TLS 1.3 - What Changes? What stays the same?
8:02
Practical Networking
Рет қаралды 19 М.
SSL, TLS, HTTPS Explained
5:54
ByteByteGo
Рет қаралды 855 М.
Advanced iOS : SSL Pinning in iOS Through URLSession
19:58
iOSCoderAbhimanyuDaspan
Рет қаралды 14 М.
TLS/SSL Certificate Pinning Explained
12:03
Hussein Nasser
Рет қаралды 59 М.
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН