YoVDO

The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses TCP/IP Courses Intrusion Detection Courses Supply Chain Security Courses Static Analysis Courses

Course Description

Overview

Explore the security implications of complexity and ambiguity in RFC implementations through a 36-minute Black Hat conference talk. Analyze the vulnerabilities arising from different interpretations of RFC 1035's message compression in TCP/IP stacks. Delve into the 20-year history of compression vulnerabilities, examine newly discovered issues, and discuss affected devices. Learn about anti-patterns, supply chain impacts, and potential solutions including improved documentation, static analysis, device fingerprinting, and intrusion detection. Gain insights from speakers Daniel dos Santos and Shlomi Oberman on the critical intersection of protocol complexity and cybersecurity.

Syllabus

Intro
Why look more closely at DNS?
Domain Name System (DNS)
DNS encoding and compression
20 years of compression vulnerabilities
New vulnerabilities
Anti-Pattern #1
Affected devices
Again, the supply chain
Better documentation
Static analysis
Device fingerprinting
Intrusion detection


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network