• caglararli@hotmail.com
  • 05386281520

How easy is it for hackers to intercept http traffic between VPN exitnode and the destination web service without being inside the VPN or web server?

Çağlar Arlı      -    63 Views

How easy is it for hackers to intercept http traffic between VPN exitnode and the destination web service without being inside the VPN or web server?

Let’s say I’m using http connection over a properly set up VPN with secure protocol and implementation. Then, most likely, the connection will be secure all the way until it exits the VPN server.

But since the traffic is unencrypted, sensitive information is at risk if it’s intercepted after that point. I’m curious how easy it is to intercept it.

As far as I know, the hacker should be inside the VPN endpoint or at the destination itself, meaning the VPN server or the website itself are already compromised, like the case of tor sniffing where the exit nodes are owned by malicious actors themselves.

If that’s the only most viable way, then, although there are still far more risks than TLS/Https, it doesn’t seem to be that extremely dangerous to access a http website over a trusted VPN.

(I’m aware of rarer cases like BGP hijacking.)