Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is poisontap effective with HSTS enabled website ? #119

Open
theCake75 opened this issue Jun 13, 2017 · 0 comments
Open

Is poisontap effective with HSTS enabled website ? #119

theCake75 opened this issue Jun 13, 2017 · 0 comments

Comments

@theCake75
Copy link

theCake75 commented Jun 13, 2017

Hello,

I didnt understand something, I know that Poisontap is works good by capturing non-HSTS website's cookies, I tried to reinject the cookie captured by poisontap on another pc by document.cookie on console and it worked fine but what about the major websites ? (twitter, facebook ...), does the backdoor configuration can do something ? Or are we totally safe on those website againts PS ?

I didnt correcty understand this :

allows attacker to remotely force the user to make HTTP requests and proxy back responses (GET & POSTs) with the user's cookies on any backdoored

Does this mean the attacker can get (example)twitter session cookies with the backdoor remotely ?
I dont see any twitter.com cookie on my poisontap.cookies.log

@theCake75 theCake75 changed the title Is poisontap effective with HT2S enabled website ? Is poisontap effective with HSTS enabled website ? Jun 13, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant