Stealthier Attacks and Smarter Defending With TLS Fingerprinting
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Stealthier Attacks & Smarter Defending with TLS Fingerprinting
A "Zero Math, (almost) Zero Crypto", TLS Talk
TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
Fingerprints
Why
Origin Story
Expanding.
Extensions
Significant, key-value order is!
Creating a FingerPrint
Deobfuscation
Any Port v Stateless v Asymmetric v Low Cost v
Storage & Retention
Own Fingerprint Modification
Collisions?
Yes... ok no. sort of.... a bit.... occasionally
Anomaly Detection
Not Just
Attacker Level 1: Stealth MiTM
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
TLS Attacks
Fingerprint Defined Routing Ž
Attacker Level 2: AntiForensics
Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
Fingerprint Canaries
Homogeneous Platforms
End Of Level Boss: Nation State Attackers (zomg!) ?
Honorable Mention: HoneyPots
FingerPrint DB
Demo?
What's Next?
Random Observations
Related Courses
Skynet Will Use PsExec When SysInternals Go BadYouTube The Little Phone That Could Ch-ch-chroot
Security BSides London via YouTube A Tale of Two Malware Families - Overcoming Anti-Forensics and Foiling Botnets in the Cloud
BSidesLV via YouTube Moar Anti-Forensics for the Louise
BruCON Security Conference via YouTube Anti-Forensics on SAP Systems
WEareTROOPERS via YouTube