This shows you the differences between two versions of the page.
|
iothings:laboratoare:2025:lab8 [2025/11/15 13:30] dan.tudose [Modify the Firmware to Add the Certificate] |
iothings:laboratoare:2025:lab8 [2025/11/18 12:30] (current) dan.tudose [Step 2 – Start mitmproxy in reverse mode (attacker machine)] |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Lab 8. Security in IoT ====== | + | ====== Lab 8. IoT Security and Attacks ====== |
| ===== Breaking an insecure IoT sensor over HTTP ===== | ===== Breaking an insecure IoT sensor over HTTP ===== | ||
| Line 282: | Line 282: | ||
| </code> | </code> | ||
| - | * then run mitmproxy as a reverse proxy: | + | * then run mitmproxy as a reverse proxy with ssl_insecure (so it doesn't check the secure server's certificate when it forwards the messages): |
| <code bash> | <code bash> | ||
| - | mitmproxy --mode reverse:https://192.168.0.104:8443 -p 8444 | + | mitmproxy --mode reverse:https://192.168.0.104:8443 -p 8444 --set ssl_insecure=true |
| </code> | </code> | ||