Stealthier Attacks and Smarter Defending With TLS Fingerprinting
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Stealthier Attacks & Smarter Defending with TLS Fingerprinting
A "Zero Math, (almost) Zero Crypto", TLS Talk
TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
Fingerprints
Why
Origin Story
Expanding.
Extensions
Significant, key-value order is!
Creating a FingerPrint
Deobfuscation
Any Port v Stateless v Asymmetric v Low Cost v
Storage & Retention
Own Fingerprint Modification
Collisions?
Yes... ok no. sort of.... a bit.... occasionally
Anomaly Detection
Not Just
Attacker Level 1: Stealth MiTM
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
TLS Attacks
Fingerprint Defined Routing Ž
Attacker Level 2: AntiForensics
Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
Fingerprint Canaries
Homogeneous Platforms
End Of Level Boss: Nation State Attackers (zomg!) ?
Honorable Mention: HoneyPots
FingerPrint DB
Demo?
What's Next?
Random Observations
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube