SSL, Gone in 30 Seconds - A BREACH Beyond CRIME
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking hands-on talk that unveils new targeted techniques for retrieving encrypted secrets from HTTPS channels. Delve into the algorithm behind this browser-based attack, which can extract session identifiers, CSRF tokens, OAuth tokens, email addresses, and ViewState hidden fields in under 30 seconds. Learn how basic statistical analysis can be applied to extract data from dynamic pages, and discover practical mitigations to implement immediately. Gain insights into the vulnerability posture of various SaaS vendors and access the BREACH tool, released to help the community assess exposure levels and deploy appropriate protection measures. The 56-minute presentation covers compression overview, CRIME against response body, BREACH architecture and command & control, SSL length revelations, compression oracle, roadblocks, mitigations, and future work in this critical area of cybersecurity.
Syllabus
Intro
AGENDA
COMPRESSION OVERVIEW
A CRIME AGAINST THE RESPONSE BODY
BREACH / the ingredients
BREACH / architecture
BREACH / command & control
C&C/ logic
SSL REVEALS LENGTH
COMPRESSION ORACLE (IT)
THE ORACLE
YET MORE ROADBLOCKS
MITIGATIONS
FUTURE WORK
Taught by
Black Hat
Related Courses
Data Wrangling with MongoDBMongoDB via Udacity Data Science Essentials for SAP
OnSAP Academy via Independent Herramientas de la Inteligencia de Negocios
Galileo University via edX Digital Media Analytics: Using 'Listening Data'
Purdue University via FutureLearn Advanced Business Analytics
University of Colorado Boulder via Coursera