Less than 5min with bettercap and sslstrip to intercept XMPP+STARTTLS. Always check certs y’all. No exceptions.

@ajmartinez What client/server isn't enforcing TLS with proper certs these days?
Follow

@moparisthebest pretty much everything under the umbrella of IoT is non-compliant with the protocol standards they use for telemetry.

For example, XMPP core states one MUST validate certificates if they are used. Given that my successful attack was both fast and trivial, it’s clear that part of the spec was ignored on the client and that indeed the server did not require a client cert or a stronger xmpp-sasl authentication method than “PLAIN”.

A post is coming soon.

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml