| ▲ | maltalex 7 hours ago | |
Here are some examples: The attacker can impersonate the victim, get a valid x509 certificate issued to it, and create a perfect replica of their website/api/whatever. The attacker can perform a man-in-the-middle attack on the victim - record traffic, inject traffic, manipulate traffic, etc. The attacker can just deny access to the victim - just drop packets meant for the victim. | ||