Captain Pool
Oct 7, 2024

Hello sir,

I understood the proxy created in between the client and the server that only accepts the request from the Dual-Home firewalls in place.

My question is, how can an attacker sitting in the same network (kind of like MiTM) create or enforce this settings so that he/she gets all decrypted client's request and server's response in real time. Can it be abused, even if it could, how will the client's browser not show the IP/location of the proxy, and still think it is the server that they are talking to?

Your insights on this will be greatly appreciated.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Captain Pool
Captain Pool

Written by Captain Pool

Information Security Analyst, Cyber Security Enthusiast, Computer Science Graduate.

No responses yet

Write a response