Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The article says they used mitmproxy which installs a system certificate


I think the payload after that though is that MITM proxy delivering an HTTP link to an EXE that anyone can payload with MITM, same attack surface.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: