Stealthier Attacks & Smarter Defending with TLS Fingerprinting
3
A "Zero Math, (almost) Zero Crypto", TLS Talk
4
TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
5
Fingerprints
6
Why
7
Origin Story
8
Expanding.
9
Extensions
10
Significant, key-value order is!
11
Creating a FingerPrint
12
Deobfuscation
13
Any Port v Stateless v Asymmetric v Low Cost v
14
Storage & Retention
15
Own Fingerprint Modification
16
Collisions?
17
Yes... ok no. sort of.... a bit.... occasionally
18
Anomaly Detection
19
Not Just
20
Attacker Level 1: Stealth MiTM
21
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
22
TLS Attacks
23
Fingerprint Defined Routing Ž
24
Attacker Level 2: AntiForensics
25
Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
26
Fingerprint Canaries
27
Homogeneous Platforms
28
End Of Level Boss: Nation State Attackers (zomg!) ?
29
Honorable Mention: HoneyPots
30
FingerPrint DB
31
Demo?
32
What's Next?
33
Random Observations
Description:
Explore the intricacies of TLS fingerprinting in this 46-minute conference talk from Derbycon 2015. Delve into stealthier attack techniques and smarter defense strategies, focusing on a "zero math, (almost) zero crypto" approach to TLS. Learn about fingerprint creation, deobfuscation, and anomaly detection. Examine various attack levels, including stealth MiTM, anti-forensics, and potential nation-state tactics. Discover the concept of fingerprint canaries and their application in homogeneous platforms. Gain insights into fingerprint-defined routing, honeypo ts, and the future of TLS fingerprinting through practical demonstrations and random observations.
Stealthier Attacks and Smarter Defending With TLS Fingerprinting