YoVDO

The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses TCP/IP Courses Intrusion Detection Courses Supply Chain Security Courses Static Analysis Courses

Course Description

Overview

Explore the security implications of complexity and ambiguity in RFC implementations through a 36-minute Black Hat conference talk. Analyze the vulnerabilities arising from different interpretations of RFC 1035's message compression in TCP/IP stacks. Delve into the 20-year history of compression vulnerabilities, examine newly discovered issues, and discuss affected devices. Learn about anti-patterns, supply chain impacts, and potential solutions including improved documentation, static analysis, device fingerprinting, and intrusion detection. Gain insights from speakers Daniel dos Santos and Shlomi Oberman on the critical intersection of protocol complexity and cybersecurity.

Syllabus

Intro
Why look more closely at DNS?
Domain Name System (DNS)
DNS encoding and compression
20 years of compression vulnerabilities
New vulnerabilities
Anti-Pattern #1
Affected devices
Again, the supply chain
Better documentation
Static analysis
Device fingerprinting
Intrusion detection


Taught by

Black Hat

Related Courses

Secure Software Development: Verification and More Specialized Topics
Linux Foundation via edX
Developing Secure Software
LinkedIn Learning
Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning
Tüm Aşamalarıyla İnşaat Eğitimi - AUTOCAD/STA4/EXCEL/PROJECT
Udemy
Mobile Security: Reverse Engineer Android Apps From Scratch
Udemy