Stealthier Attacks and Smarter Defending With TLS Fingerprinting
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Stealthier Attacks & Smarter Defending with TLS Fingerprinting
A "Zero Math, (almost) Zero Crypto", TLS Talk
TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
Fingerprints
Why
Origin Story
Expanding.
Extensions
Significant, key-value order is!
Creating a FingerPrint
Deobfuscation
Any Port v Stateless v Asymmetric v Low Cost v
Storage & Retention
Own Fingerprint Modification
Collisions?
Yes... ok no. sort of.... a bit.... occasionally
Anomaly Detection
Not Just
Attacker Level 1: Stealth MiTM
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
TLS Attacks
Fingerprint Defined Routing Ž
Attacker Level 2: AntiForensics
Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
Fingerprint Canaries
Homogeneous Platforms
End Of Level Boss: Nation State Attackers (zomg!) ?
Honorable Mention: HoneyPots
FingerPrint DB
Demo?
What's Next?
Random Observations
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network