My second question with nogotofail MiTM tester is
enabledCipherSuites.add("TLS_DH_anon_WITH_AES_128_CBC_SHA");
enabledCipherSuites.add("TLS_ECDH_anon_WITH_AES_128_CBC_SHA");
This is not supported by current Android version. WHY it has been added to code?
The current supported cipher suit are as follows,
Cipher Suits 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_DHE_RSA_WITH_AES_128_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_DHE_RSA_WITH_AES_256_CBC_SHA 02-09 10:47:08.387 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_RSA_WITH_AES_128_GCM_SHA256 02-09 10:47:08.388 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_RSA_WITH_AES_256_GCM_SHA384 02-09 10:47:08.388 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_RSA_WITH_AES_128_CBC_SHA 02-09 10:47:08.388 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_RSA_WITH_AES_256_CBC_SHA 02-09 10:47:08.388 22221-22432/net.nogotofail.mitmtester D/TlsUtil: TLS_EMPTY_RENEGOTIATION_INFO_SCSV ------------------------------------------------------------------------------------------------------------ Test Scenario When i commented the following two lines //enabledCipherSuites.add("TLS_DH_anon_WITH_AES_128_CBC_SHA");
//enabledCipherSuites.add("TLS_ECDH_anon_WITH_AES_128_CBC_SHA"); and created and install apk on my device step 2 nogotofail MiTM tester --> TLS/SSL --> HTTPS REQUEST WITHOUT SERVER AUTHENTICATION following message is displayed HTTP/1.0 302 Found Log for server 2017-02-09 10:53:17,826 [DEBUG] Using data handlers clientreport, bufferedhttp 2017-02-09 10:53:17,828 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 logging](Unknown) Selected for connection 2017-02-09 10:53:17,854 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 logging](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") Connection established 2017-02-09 10:53:17,855 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 logging](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") Handler being removed 2017-02-09 10:53:17,855 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 selfsigned](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") Selected for connection 2017-02-09 10:53:17,855 [DEBUG] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 selfsigned](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") SSL starting 2017-02-09 10:53:17,909 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 selfsigned](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") SSL connection established 2017-02-09 10:53:17,910 [CRITICAL] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 selfsigned](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") MITM Success! Cert file: /tmp/._cert_ca.pem_-4408897662695739272.pem 2017-02-09 10:53:17,926 [INFO] [10.0.0.2:51117<=>172.217.26.100:443 54c21f79-37c5-4a85-a0a5-56620de50e59 selfsigned](client=Sony/BRAVIA_ATV2_JP/BRAVIA_ATV2:7.0/NRD91N.S4/0.1.0.08.01.1.00:userdebug/dev-keys application="net.nogotofail.mitmtester" version="1") Connection closed | |
--
You received this message because you are subscribed to the Google Groups "nogotofail" group.
To unsubscribe from this group and stop receiving emails from it, send an email to nogotofail+...@googlegroups.com.
To post to this group, send email to nogot...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/nogotofail/4a829a29-fa17-440d-affa-82af63fdcb0f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "nogotofail" group.
To unsubscribe from this group and stop receiving emails from it, send an email to nogotofail+...@googlegroups.com.
To post to this group, send email to nogot...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/nogotofail/61a019eb-a8a4-4375-896e-292648930f93%40googlegroups.com.