Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PLUSKAL, J. VESELÝ, V.
Originální název
Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0
Typ
audiovizuální tvorba
Jazyk
angličtina
Originální abstrakt
The end-to-end HTTPS encryption and the volatile nature of web content make any interception and collection of data on the Internet a challenge. The presentation introduces methods addressing both of these phenomena intercepting TLS/SSL connections with the help of man-in-the-middle attack employing proxy and automatically creating snapshots of problematic web pages. Speakers outline necessary theory (including news about TLS 1.3, HSTS, HTTP3.0), well-known attacks (e.g., renegotiation, downgrade, cipherspec change, and others), and industry-standard tools for traffic analysis (such as Wireshark, Fiddler proxy, SSL-Split) and decoding (e.g., Selenium, Scrapy). The session will include a live demo of MitM attack on HTTPS connection enhanced with covert extraction of form data, which would be later used to periodically web scrape and archive protected content.
Klíčová slova
web scraping, TLS/SSL, MitM, HTTP
Autoři
PLUSKAL, J.; VESELÝ, V.
Vydáno
14. 6. 2022
Místo
ISS World Europe 2022, Praha
Strany do
50
Strany počet
BibTex
@misc{BUT179383, author="Jan {Pluskal} and Vladimír {Veselý}", title="Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0", year="2022", pages="50", address="ISS World Europe 2022, Praha", note="presentation" }