YoVDO

Breaking Binary Protocols and Bad Crypto

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Cryptography Courses Network Security Courses Reverse Engineering Courses Network Traffic Analysis Courses Differential Cryptanalysis Courses

Course Description

Overview

Explore the process of reverse-engineering and exploiting network devices in this 44-minute Security BSides London talk. Delve into Graham Sutherland's journey from having little knowledge of a widely deployed system to developing powerful exploits. Learn techniques for analyzing and attacking binary protocols, including a method for classifying and identifying unknown cryptography. Gain insights into the initial approach, reverse engineering process, and crypto classification. Discover how to analyze traffic, payloads, and packet structures. Understand the importance of differential cryptanalysis and packet encryption. Follow along as Sutherland shares his experiences with SSL, Diffie-Hellman, and HTTP encryption. Perfect for security professionals and enthusiasts looking to enhance their skills in breaking binary protocols and bad crypto.

Syllabus

Introduction
Background Information
First Light
History
Initial approach
DB9 connector
TCP ports
Console management
Reverse engineering
Validation
SSL
Diffie
Tiffany Hellman
Lunge
My favorite gift
Im lazy
Analyzing the traffic
Analyzing the payload
Crypto classification
Differential cryptanalysis
Packet structure
Packet encryption
HTTP encryption
Session IDs
Any questions


Taught by

Security BSides London

Related Courses

Symmetric Cryptanalysis II
RSA Conference via YouTube
Blockcipher Cryptanalysis - Differential and Impossible Differential Attacks
TheIACR via YouTube
Differential Trail Search and Bounds in Cryptography - Session 1
TheIACR via YouTube
Cryptanalysis Techniques and Applications - Session 24
TheIACR via YouTube
Cryptanalysis - Continued
TheIACR via YouTube