Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PLUSKAL, J.
Originální název
Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0
Typ
audiovizuální tvorba
Jazyk
angličtina
Originální abstrakt
The presentation introduces methods for intercepting TLS/SSL connections. The focus is on man-in-the-middle attack employing proxy and other ways how to obtain unencrypted content of the TLS/SSL session. Speakers outline necessary theory (including news about TLS 1.3), well-known attacks (e.g., renegotiation, downgrade, cipherspec change, and others) and industry-standard tools (such as Wireshark, NetFox Detective, Fiddler Proxy and SSL-Split). The session also includes a live demonstration of the MitM attack on HTTPS connections enhanced with form-logging JavaScript injection. Participants will receive free of charge access to the testbed, which consists of real devices (and their traffic), including the prototype of our hardware probe decrypting SSL/TLS on-the-fly.
Autoři
Vydáno
10. 3. 2022
Místo
Dubaj
Strany počet
60
BibTex
@misc{BUT177255, author="Jan {Pluskal}", title="Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0", year="2022", pages="60", address="Dubaj", note="presentation" }