Главная
Study mode:
on
1
Intro
2
Pizza delivery example
3
Traffic
4
Compression
5
Search language
6
Exploit
7
Double narrative
8
FIESTA
9
Configuration file
10
Fake web
11
HTTP
12
Image loading
13
Image loading test
14
The trick
15
Example
16
Bounty hunters
17
Google
18
Facebook
19
Bug bounties
20
Hiding window
21
JavaScript
22
Conclusion
Description:
Explore FIESTA, a new tool for testing HTTPS side-channel vulnerabilities, in this 42-minute conference talk from OWASP AppSec EU 2018. Delve into the world of TLS traffic exploitation and learn about past attacks like CRIME, BREACH, and TIME. Discover a previously unused side-channel affecting major internet companies. Examine the tool's configuration, fake web setup, and image loading techniques. Investigate real-world examples involving Google and Facebook, and discuss bug bounty implications. Gain insights into JavaScript-based countermeasures and understand the broader implications for online security.

FIESTA - An HTTPS Side-Channel Party

OWASP Foundation
Add to list