Skip to content

A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.

Notifications You must be signed in to change notification settings

Roni-Carta/certmitm

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

certmitm Tool

certmitm is a tool designed to demonstrate and test vulnerabilities in applications that fail to properly validate TLS certificates. By taking advantage of these vulnerabilities, an attacker might intercept and manipulate traffic, compromising the integrity and confidentiality of the data.

Purpose

Many mobile applications utilize Transport Layer Security (TLS) as a standard to establish secure communication channels for transmitting sensitive data. These channels are considered secure, primarily due to the trust model around certificates. However, if an application fails to validate these certificates correctly, it opens up a vulnerability that can be exploited.

This tool aims to highlight these vulnerabilities, providing security professionals a mechanism to test applications and thereby encouraging developers to adopt proper TLS validation methods.

Credits

The certmitm tool was created by aapooksman, and this repository seeks to provide instructions and context for its usage.

Prerequisites

  • Docker installed on your machine.

How to Use

  1. Clone the Repository:
   git clone https://github.com/Roni-Carta/certmitm
  1. Navigate to the Tool Directory:
cd certmitm
  1. Build and Start the Tool:
docker-compose up --build
  1. Setup and Test: Ensure that the server and the device you're testing are on the same network. Set up the device's DNS to the server's IP. For example, if your server IP is 192.168.1.16, set this IP as the DNS in the device settings.

  2. Test the Application: Download and install the application you wish to test. Start the application. If you don't notice any logs on your server, try restarting the application a few times.

  3. Review Logs: When the vulnerability is triggered, you should observe logs in your server's console, which will provide insight into the intercepted traffic.

Note: Always ensure you have permission to test the application, and never use this tool for malicious intent.

About

A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 96.9%
  • Dockerfile 2.4%
  • Shell 0.7%