Get a Pentest and security assessment of your IT network.

Cyber Security

HTTPS & MITM: Can Your WiFi Provider See Your Data?

TL;DR

Generally, a wifi provider cannot decrypt HTTPS traffic using a Man-in-the-Middle (MITM) attack without users noticing. Modern browsers and operating systems use certificate pinning and other security measures to prevent this. However, it’s still possible in specific scenarios – like if a user installs a malicious certificate or ignores browser warnings.

Understanding the Problem

HTTPS (Hypertext Transfer Protocol Secure) encrypts communication between your computer and websites. This makes it very difficult for anyone—including your WiFi provider—to read the data being exchanged. A Man-in-the-Middle attack involves intercepting this communication.

Why It’s Difficult to Intercept HTTPS

  1. Certificates: Websites have digital certificates that prove their identity. Your browser checks these certificates before establishing a secure connection.
  2. Certificate Authorities (CAs): Trusted CAs issue these certificates. Browsers come with a list of trusted CAs.
  3. Public Key Infrastructure (PKI): This system ensures the authenticity and integrity of certificates.

How an MITM Attack *Could* Work (and Why It’s Rare)

For a WiFi provider to successfully perform an MITM attack on HTTPS, they would need to:

  1. Generate a Fake Certificate: They’d create a certificate for the website you are trying to visit.
  2. Get Their CA Trusted by Your Device: This is the hardest part. If their CA isn’t already trusted, your browser will show warnings.
  3. Intercept Traffic: Redirect your traffic through their server.
  4. Present the Fake Certificate: When your browser requests the website, they present the fake certificate instead of the real one.

If you ignore browser security warnings and install the malicious certificate, the attack can succeed.

Steps to Protect Yourself

  1. Pay Attention to Browser Warnings: Never ignore security warnings about invalid certificates.
  2. Certificate Pinning: Some websites use certificate pinning, which hardcodes the expected certificate into apps or browsers. This makes MITM attacks much harder. Check if your frequently used sites support this.
  3. Use a Reputable VPN: A Virtual Private Network encrypts all your traffic before it leaves your device, protecting you from WiFi provider interception.
  4. Keep Your Software Updated: Updates often include security fixes that address vulnerabilities.
  5. Check Your WiFi Security Settings: Use WPA3 encryption if available. Avoid open or weakly secured networks.

Technical Details (For Advanced Users)

An attacker might attempt to use tools like:

  • SSLStrip: This tool downgrades HTTPS connections to HTTP, making them vulnerable. However, modern browsers are increasingly resistant to this attack due to HSTS (HTTP Strict Transport Security).
  • Proxy Servers: Intercepting traffic through a rogue proxy server.

Example of checking certificate details in Chrome:

chrome://net-internals/#certificates

You can also use command line tools like openssl s_client to inspect certificates.

openssl s_client -connect example.com:443

Conclusion

While theoretically possible, a WiFi provider successfully performing an MITM attack on HTTPS without your knowledge is unlikely with modern security measures in place. Staying vigilant about browser warnings and using appropriate security tools like VPNs are the best ways to protect yourself.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation