Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PLUSKAL, J.
Originální název
SSL/TLS Interception Workshop (TLS1.3 edition)
Typ
audiovizuální tvorba
Jazyk
angličtina
Originální abstrakt
The presentation introduces methods for intercepting TLS/SSL connections. The focus is on man-in-the-middle attack employing proxy and other ways how to obtain unencrypted content of the TLS/SSL session. Speakers outline necessary theory (including news about TLS 1.3), well-known attacks (e.g., renegotiation, downgrade, cipherspec change, and others) and industry-standard tools (such as Wireshark, NetFox Detective, Fiddler Proxy and SSL-Split). The session also includes a live demonstration of the MitM attack on HTTPS connections enhanced with form-logging JavaScript injection. Participants will receive free of charge access to the testbed, which consists of real devices (and their traffic), including the prototype of our hardware probe decrypting SSL/TLS on-the-fly.
Klíčová slova
SSL, TLS, MitmM
Autoři
Vydáno
9. 3. 2020
Místo
Dubai
Strany počet
60
BibTex
@misc{BUT176593, author="Jan {Pluskal}", title="SSL/TLS Interception Workshop (TLS1.3 edition)", year="2020", pages="60", address="Dubai", note="presentation" }