Htaccess code 404 does not intercept an incorrect URL path (with a / in the string

I have a simple 404 redirect in my htaccess file:

ErrorDocument 401 /404.htm

ErrorDocument 404 /404.htm

RewriteEngine On
RewriteCond% {SERVER_PORT} 80
RewriteRule ^ (. *) $ Https://hypnosis-retreat.co.uk/$1 (R, L)

When I enter the domain https://hypnosis-retreat.co.uk/bhabha, it displays page 404 correctly. When I enter the URL https://hypnosis-retreat.co .uk / bhabha / morebhabha, rendering of page 404 fails.

I need to trap a path that leads nowhere.

Welcome suggestions,

Gary

How to intercept SSL requests made by an Android Flutter application?

How is it possible to intercept https requests made by a flutter application whose source code I don't have (I just have an apk file)?
I have already tried the Xposed Framework SSL decoupling module. (No chance)

tls – Attempt to intercept traffic from native iPhone messaging application on Burp Suite

I'm trying to intercept traffic from my iPhone's default email client.
I installed the burp suite with the certificate installed correctly because I am receiving traffic from the browser but I cannot see the traffic from my email application.

Could someone help me with what's going on?

simcard – Intercept the phone number via the SIM applet

a use case requires us to intercept a dialed call number. we are trying to find out if it can be intercepted via sim card
We looked for The call log and it's a bust – where 2 possible files in which the number could be saved DFtelecomm-> EFldn (last number dialed) or ADFusim-> EFoci (information on outgoing calls). We have confirmed that these services are activated on the SIM card – they are.
We have tried several handsets – basically everyone we have – and overall the number dialed is never stored in the SIM card.
The bottom line is that the baseband chip in the handsets that controls the call does not write to these files.

Experience in this area? We have thought of call control by USIM, do you have experience with that?

Intercept iOS application requests (may require disassembly)

Need a freelance writer capable of sniffing out requests for iOS apps. In previous versions of the app, there was enough Jailbreak + Fiddler + Proxy + SSL Unpinning, but with the release of the new version of the app, the most important requests started to be encrypted one way or another and now they no longer appear in the Fiddler. The strangest thing is that other, less important requests are intercepted, from which we can conclude that the application somehow masks specific requests and that it may need to. ..

Intercept iOS application requests (may require disassembly)

How does Smart DNS intercept traffic and what are the implications?

From what I've learned about Smart DNS, a device such as a router is configured with the IP addresses of the DNS server of the Smart DNS provider, as opposed to those provided by the provider. Internet services or Google for example.

In addition, the IP address that the ISP attributed to me does not change. If services such as Netflix apply geo blocking, this suggests that Smart DNS providers intercept the request to Netflix and make a surrogate request on my behalf as a Netflix client, revealing the provider's IP address. Smart DNS and not the recipient. ISP to which I am connected.

If my understanding is correct, the consequences can be serious in that applications can be redirected to malicious sites with the appearance of a trusted site.

How does this differ from services such as OpenDNS or Clean Browsing?

What are the other implications?

man in the middle – can Burp be configured to intercept a client application?

I have a client application installed on my Windows and I wanted to perform a MITM on this application to inspect the traffic.
I understand that Burp can use MITM for a web application, but can it do the same for a client application?
If so, how to configure Burp to intercept with client applications? Thank you!

How to intercept a Woocommerce plugin file

Please help solve the problem.

Woocommerce plugin has related.php file connection –
https://github.com/woocommerce/woocommerce/blob/527a7261bd0ad1f4ba1d8eb2f82a96f53867b715/includes/wc-template-functions.php#L1925

This file is responsible for displaying similar products in the product card. As far as I can remember, the file can be modified in the subject itself by creating the /woocommerce/single-product/related.php folder at the root of the model

But my job is to intercept this file and transfer it to my plugin. Even if in the subject, we create the directory /woocommerce/single-product/related.php, the priority must remain mine, with a redirection towards my file.

Tell me or show an example of interception of this file https://github.com/woocommerce/woocommerce/blob/527a7261bd0ad1f4ba1d8eb2f82a96f53867b715/includes/wc-template-functions.php#L1925 so that it works at from another source.

man in the middle – How to intercept the data that my communicator sends and receives?

I want to check how and what is sent when I interact with my TV via the remote control that communicates with the communication box (not with smart tv). I am curious to know which protocols are used and how often the communicator calls home. Does it send encrypted data or not. The access provider is also my TV network provider.

To address this issue, I have tried using a newly acquired knowledge of ARP intoxication. I have installed a Linux Kali and used arpspoof. I also enabled IP forwarding and launched Wireshark, but I did not receive any type of packet that I could assign to my communication box. The television also continued to work normally, which brings me to two theories:

  1. ARP poisoning failed, so the television worked normally and
    Wireshark did not show any packages.
  2. ARP poisoning has worked, television has continued to work and IP transfer has to
    worked too, but why would Wireshark not capture anything then?

Before that, I had tested ARP poisoning on a second PC at home and managed to intercept the traffic.

What are my options? Alternatives to ARP spoofing if I want to observe the traffic that my home appliances send to the Internet? A special type of router to put between the TV communicator and the rest of the home network?

Can an Android app intercept and filter / block notifications sent to Bluetooth devices? "

I've recently noticed that since the abandonment of Pebble, most smart watches (fitness-oriented) have no way to put whitelists or blacklists on apps that transmit their messages (for example, any Garmin AFAICT product, Polar product).

Is there anything in the Android SDK that would allow a third-party application to implement this behavior? That is, the interception broadcast (assuming that notifications are transmitted even that way) notifications to connected Bluetooth devices, so that a single application can prevent notifications from occurring. to be propagated to smartwatches and others?

One of the main reasons for wanting this is that some notification element cards for actions such as downloading constant buzzing on a smartwatch that makes the mirror notification completely unusable, which requires me to switch to DnD mode on the smartphone or smartwatch.