tag:blogger.com,1999:blog-37798047.post4071252093787669255..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: You travelers in hotels, please send ViewSource/pcapsDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-37798047.post-66309038476428299982012-05-14T12:29:42.321-04:002012-05-14T12:29:42.321-04:00An interesting project idea Robert. What about ARP...An interesting project idea Robert. What about ARP spoofing tools to inject HTML and javascript responses into the target browser? Or a tool such as air2pwn, which was used at a defcon years back to inject crude images where any other image would be.cwhttps://www.blogger.com/profile/02911210741016337508noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-92195229719369944072012-05-13T14:51:28.217-04:002012-05-13T14:51:28.217-04:00Shush.
You don't actually need to sniff it. Y...Shush.<br /><br />You don't actually need to sniff it. You can do all that over sockets. Establish a connection to httpS://twitter.com and http://twitter.com, download both pages, compare the diff. You could make this a background service that automatically does this once you've logged in.Robert Grahamhttps://www.blogger.com/profile/09879238874208877740noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-24859264350634767492012-05-13T11:59:22.607-04:002012-05-13T11:59:22.607-04:00What, no tool that sniffs your http traffic, makes...What, no tool that sniffs your http traffic, makes the same http request over an encrypted tunnel, compares the two HTML pages, and automatically submits the pcaps for the differences?Anonymoushttps://www.blogger.com/profile/01938554978113604206noreply@blogger.com