This is an educational demonstration of a Man-in-the-Middle (MitM) attack scenario. The purpose is to understand how traffic interception works and why proper security measures are important. Do not use this setup for any malicious purposes.
When you connect to this VPN:
iOS Client Configuration
Android Client Configuration
After connecting to the VPN, try the following:
http://example.com) - you should see our fake login pagehttps://google.com) - you should see a certificate warningThis demonstrates why: