The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security implications of complexity and ambiguity in RFC implementations through a 36-minute Black Hat conference talk. Analyze the vulnerabilities arising from different interpretations of RFC 1035's message compression in TCP/IP stacks. Delve into the 20-year history of compression vulnerabilities, examine newly discovered issues, and discuss affected devices. Learn about anti-patterns, supply chain impacts, and potential solutions including improved documentation, static analysis, device fingerprinting, and intrusion detection. Gain insights from speakers Daniel dos Santos and Shlomi Oberman on the critical intersection of protocol complexity and cybersecurity.
Syllabus
Intro
Why look more closely at DNS?
Domain Name System (DNS)
DNS encoding and compression
20 years of compression vulnerabilities
New vulnerabilities
Anti-Pattern #1
Affected devices
Again, the supply chain
Better documentation
Static analysis
Device fingerprinting
Intrusion detection
Taught by
Black Hat
Related Courses
Cyber Security in ManufacturingUniversity at Buffalo via Coursera Supply Chain and Operations Management Tips
LinkedIn Learning Kubernetes Security: Implementing Supply Chain Security
Pluralsight Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary