Detail publikace

Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0

PLUSKAL, J.

Originální název

Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0

Typ

audiovizuální tvorba

Jazyk

angličtina

Originální abstrakt

The presentation introduces methods for intercepting TLS/SSL connections. The focus is on man-in-the-middle attack employing proxy and other ways how to obtain unencrypted content of the TLS/SSL session. Speakers outline necessary theory (including news about TLS 1.3), well-known attacks (e.g., renegotiation, downgrade, cipherspec change, and others) and industry-standard tools (such as Wireshark, NetFox Detective, Fiddler Proxy and SSL-Split). The session also includes a live demonstration of the MitM attack on HTTPS connections enhanced with form-logging JavaScript injection. Participants will receive free of charge access to the testbed, which consists of real devices (and their traffic), including the prototype of our hardware probe decrypting SSL/TLS on-the-fly.

Autoři

PLUSKAL, J.

Vydáno

10. 3. 2022

Místo

Dubaj

Strany počet

60

BibTex

@misc{BUT177255,
  author="Jan {Pluskal}",
  title="Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0",
  year="2022",
  pages="60",
  address="Dubaj",
  note="presentation"
}