You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.
It would be nice to provide an example app that is known to be vulnerable to a few of the things we detect so that people can easily see how the Android setup works and to verify their testing setup is working correctly.
The text was updated successfully, but these errors were encountered:
This adds an Android application which offers an easy way to generate
vulnerable traffic which should be detected by the MiTM. This should
be useful for quickly testing the various attack/detection
functionality of the nogotofail MiTM.
This commit adds a small number of tests to cover the most typical
vulnerable traffic: HTTPS requests where the identity of the server is
not fully verified, and cleartext HTTP requests with an Authorizaton
header which thus leaks authentication credentials. More tests will be
added later.
Fixes#21
It would be nice to provide an example app that is known to be vulnerable to a few of the things we detect so that people can easily see how the Android setup works and to verify their testing setup is working correctly.
The text was updated successfully, but these errors were encountered: