Skip to main content


New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises


This entry was edited (4 weeks ago)
in reply to davel

Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to ...


Aren't all modern browsers already doing DoT or DoH ?

in reply to HelloRoot

I think DNS-over-TLS & DNS-over-HTTPS would be no less vulnerable than web-over-TLS & web-over-HTTPS.
in reply to davel

AirSnitch doesn't break TLS/HTTPS at all. Only unencrypted plain DNS traffic is exposed. DoT and DoH are encrypted, so they're fine.
in reply to HelloRoot

Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target’s operating system. The AirSnitch MitM also puts the attacker in the position to wage attacks against vulnerabilities that may not be patched. Attackers can also see the external IP addresses hosting webpages being visited and often correlate them with the precise URL.
in reply to davel

Even when HTTPS is in place, an attacker can still intercept domain look-up traffic (DNS)


this part has nothing to do with the attack.

It was always true.

Your ISP or anybody sitting on a network node could do that. Because DNS is not encrypted. It doesn't matter that the rest of the traffic, after the name resolution is HTTPS/TLS.

Thats why DoT/DoH was invented. To make DNS queries fully encrypted AND to make them look indistinguishable from normal traffic.

So if your system implements it properly, it can not be meaningfully intercepted and used in a poisoning attack.

The attack doesn't break HTTPS/TLS cryptography.

This entry was edited (4 weeks ago)
in reply to HelloRoot

I'm not disagreeing with anything you're saying and I think the articles about this are sensationalized in the impact in some ways, but I think you're focusing too much on the type of traffic that is typically encrypted with HTTPS/TLS.

I think the bigger issue is internal networks where it is still common to run non encrypted and/or unauthenticated services. This is particularly an issue when SSID segreagation (lile guest networks) was used to mitigate this kind of issue. The AirSniff paper shows that SSID isolation in many APs can be bypassed.

in reply to davel

In my opinion, the whole article is (AI) slop. It says "AirSnitch" but is actually describing "ARP spoofing".

Encryption (especially TLS) assumes the underlying transport is insecure. It's called Transport Layer Security, a secure transport made possible by utilising encryption. It already had considered MitM by design.

This entry was edited (4 weeks ago)