Hyperfox

Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN.

Hyperfox diagram

Hyperfox is capable of forging SSL certificates on the fly using a root CA certificate and its corresponding key (both provided by the user). If the target machine recognizes the root CA as trusted, then HTTPs traffic can be succesfully intercepted and recorded.

Intercepting SSL

Hyperfox saves captured data to a SQLite database for later inspection and also provides a web interface for watching live traffic and downloading wire formatted messages.

Intercepting SSL

How to avoid getting bit by Hyperfox?

The market for SSL certificates is largely owned by a small number of faceless multinational companies known as Trusted Third Parties.

The Trusted Third Party system is broken by design and there is public evidence people has been abusing the system since a long time ago.

This is basically how the Internet works today.

If you’re a software developer, you can take some special measures on protecting your users such as not trusting the system’s trusted certificates and perform the certificate validation within the application’s space, this is known as SSL Pinning. Some mobile apps such as Netflix or Twitter can’t be hacked with MITM technologies such as Hyperfox that easily because they implement SSL Pinning. In order to hack an application that implements SSL Pinning an attacker must invest significant time on cracking the binary on a rooted device, it’s harder but not impossible.

Besides capturing data, Man in The Middle attacks can also be used to rewrite or replay client requests. Imagine a situation in which a request for buying something is captured and replayed, then the client will have two charges to pay. This abuse can also be prevented at some level by API developers that implement nonce, timestamp and signature values, this way the request can only be used once and if altered, the signature will not match and will be rejected by the server.

Consider that a shared network is not a secure network: anyone connected to your Wi-Fi network can sniff the plain HTTP documents in the air with no effort, you should always use SSL while surfing and, if possible build your own VPN. There are a lot of inexpensive vm providers that can host a decent VPN for a few bucks. Proxying through SSH tunnels may also be useful in most situations and it does not require you building a VPN.

TL;DR:

You can’t.

But you can take alternative measures to make it harder for attackers to prey on you:

About

Hyperfox is a security tool, you may use it freely to:

Don’t use Hyperfox to steal from or abuse other people, that’s just lame.

Hyperfox is also an Open Source project written in the Go programming language.

Lovely gophers

License (MIT)

Copyright © 2012-2015 José Carlos Nieto, https://menteslibres.net/xiam

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.