using MITM and packet editing to defeat SSL/TLS : is this a valid method ?
-
I'm studying security -on my own- and need to clear out a few things ! If I've learned this correctly HTTPS connections do these things: 1)public key from server to client 2)client encrypts a key he generates using public key 3) sends encrypted key to server 4) server decrypts the message with his private key 5) voilĂ ! the two sides are ready to exchange information using symetric ciphers so asymmetric encryptiong is only used for sending a symmetric key over the network suppose I have a certificate and I can decrypt messages encrypted with its public key I perform a MITM attack (say ARP spoof),intercept and change the certificate the server sends with the one I know its private key. browsers pops a little warning most users ignore ("WTF is a trusted certificate anyway ??") most of the times user proceeds the key is encrypted using my public key and sent to the server I intercept the key,decrypt it,and encrypt it again with the public key the server sent then let it go to the server. server decrypts the key and I can see every info the two sides exchange. well...is it that simple ? I don't have time to test it these days so Im asking you I believe/hope I am mistaken and a "do you want to proceed" message is not the only guard