Originally posted by: bsobel
Originally posted by: Codewiz
So let me get this straight bsobel. A vulnerability that has existed for a long time but never been really exploited has been published. A tool that will make it simple to do will be released. It can easily affect anyone who does anything on wireless hotspots. And this isn't any sort of big deal?
I don't know what you don't understand, this has been exploited for YEARS. TheMiddler was released last year, it has the same functionality. This is just one more of a LARGE number of SSL MiTM tools. Saying 'never been really exploited' is bullshit.
You know as well as I do that people use SSL enabled websites on hotspots all the time. Most people believe that if they have https and the little lock, that they are safe. They believe that when they go to wachovia.com and see that little lock on the form that their information is secure. As long as they didn't have a trojan before yesterday, they pretty much were safe. Now they are not.
That not true. If they go to a fake SSL site and don't notice their bank no longer has an extended validation ssl cert its the same as if they went to a phishing site via an email. Your example is wrong, they don't go to wachovia.com they go to a 3rd party domain. In the normal SSL stripping scenario, they DO go to wachovia.com but all https links are replaced with http links.