-
Notifications
You must be signed in to change notification settings - Fork 892
FAQ
It's an english pronunciation of a polish word "modliszka". Which means mantis.
2FA isn't broken. At the end it is all about 'social engineering' that you will have to be stay alert about. Which can be e-mail, phone, post or face2face based.
If you don't want to always verify if the domain name in the URL bar of your browser isn't somehow malicious or worry if there's yet another URL spoofing bug, then consider switching to U2F protocol.
'Yubikey' is a good option, that by design will prevent a MITM scenario.... unless you will fall into another social engineer trap and fallback to standard 2FA authentication, recovery codes, etc. Stay alert.
You will have to instruct the proxy how to handle responses that contain non trivial FQDNs, obfuscated JavaScript code, dynamically added html security attributes (like "integrity"). The following parameters will be helpful to do this:
-rules string
Comma separated list of 'string' patterns and their replacements.
-targetRes string
Comma separated list of target subdomains that need to pass through the proxy
Refer to the 'How to use' for further explanation page.