Cunning With CNG - Soliciting Secrets From Schannel
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the inner workings of Microsoft's Secure Channel (Schannel) SSL/TLS library in this 47-minute Black Hat conference talk. Delve into how Schannel utilizes CryptoAPI-NG (CNG) to cache various keys and session tickets for TLS/SSL connections. Examine the underlying data structures and learn techniques to extract keys and forensically relevant information about connections. Discover how to decrypt sessions using ephemeral key exchanges and understand the cache's longevity and capacity. Gain insights into Schannel's preferred cipher suites, key isolation mechanisms, and the role of the Norypt SSL Provider. Explore the decryption of persistent keys using DPAPI and session tickets, while also considering the inherent metadata TLS provides and the limitations of Schannel caching.
Syllabus
Intro
Black Hat Sound Bytes
Disclaimer
The infamous TLS Handshake
Perfect Forward Secrecy
Schannel & CNG
Schannel Prefered Cipher Suites
Microsoft's TLS/SSL Docs
Schannel Ops
CNG Key Isolation
Background Summary
What are we trying to accomplish?
The keys? What do they get us?
Session Keys
The Norypt SSL Provider (ncryptsslp.dll)
Pre-Master Secret (PMS)
Master Secret Mapped to Unique Identifier
Ephemeral & Persistent Private keys
9 Ephemeral Private Key
1 Persistent Private key
7 Decrypting Persistent Key - DPAPI
Session Ticket key
Decrypting Session Tickets
Inherent Metadata TLS Provides
Schannel Caching Parameters
This is your Schannel Cache (x64)
Limitations
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network