Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN.
Hyperfox is capable of forging SSL certificates on the fly using a root CA certificate and its corresponding key (both provided by the user). If the target machine recognizes the root CA as trusted, then HTTPs traffic can be succesfully intercepted and recorded.
Hyperfox saves captured data to a SQLite database for later inspection and also provides a web interface for watching live traffic and downloading wire formatted messages.
The market for SSL certificates is largely owned by a small number of faceless multinational companies known as Trusted Third Parties.
This is basically how the Internet works today.
If you’re a software developer, you can take some special measures on protecting your users such as not trusting the system’s trusted certificates and perform the certificate validation within the application’s space, this is known as SSL Pinning. Some mobile apps such as Netflix or Twitter can’t be hacked with MITM technologies such as Hyperfox that easily because they implement SSL Pinning. In order to hack an application that implements SSL Pinning an attacker must invest significant time on cracking the binary on a rooted device, it’s harder but not impossible.
Besides capturing data, Man in The Middle attacks can also be used to rewrite
or replay client requests. Imagine a situation in which a request for buying
something is captured and replayed, then the client will have two charges to
pay. This abuse can also be prevented at some level by API developers that
signature values, this way the request can
only be used once and if altered, the signature will not match and will be
rejected by the server.
Consider that a shared network is not a secure network: anyone connected to your Wi-Fi network can sniff the plain HTTP documents in the air with no effort, you should always use SSL while surfing and, if possible build your own VPN. There are a lot of inexpensive vm providers that can host a decent VPN for a few bucks. Proxying through SSH tunnels may also be useful in most situations and it does not require you building a VPN.
But you can take alternative measures to make it harder for attackers to prey on you:
signaturevalues in your API server to prevent replay and rewriting attacks. The OAuth 1.0 proposal is worth reading.
Hyperfox is a security tool, you may use it freely to:
Don’t use Hyperfox to steal from or abuse other people, that’s just lame.
Copyright © 2012-2015 José Carlos Nieto, https://menteslibres.net/xiam
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.