YoVDO

The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses TCP/IP Courses Intrusion Detection Courses Supply Chain Security Courses Static Analysis Courses

Course Description

Overview

Explore the security implications of complexity and ambiguity in RFC implementations through a 36-minute Black Hat conference talk. Analyze the vulnerabilities arising from different interpretations of RFC 1035's message compression in TCP/IP stacks. Delve into the 20-year history of compression vulnerabilities, examine newly discovered issues, and discuss affected devices. Learn about anti-patterns, supply chain impacts, and potential solutions including improved documentation, static analysis, device fingerprinting, and intrusion detection. Gain insights from speakers Daniel dos Santos and Shlomi Oberman on the critical intersection of protocol complexity and cybersecurity.

Syllabus

Intro
Why look more closely at DNS?
Domain Name System (DNS)
DNS encoding and compression
20 years of compression vulnerabilities
New vulnerabilities
Anti-Pattern #1
Affected devices
Again, the supply chain
Better documentation
Static analysis
Device fingerprinting
Intrusion detection


Taught by

Black Hat

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary