Главная
Study mode:
on
1
Intro
2
Timing attacks...
3
Remote Timing Attacks Success
4
Timeless Timing Attacks: Requirements
5
Requirement #2: concurrent execution
6
Attack Scenarios
7
Cross-site Timing Attack
8
Cross-site Timeless Timing Attack
9
WPA2 & EAP-pwd
10
Bruteforcing Wi-Fi passwords
11
Conclusion
Description:
Explore a groundbreaking presentation on a novel approach to timing attacks that is completely resilient to network jitter. Delve into the evolution of timing attacks over the past 25 years, from their inception against RSA and Diffie-Hellman to their current potential to compromise millions of devices over the Internet. Learn about the challenges attackers face with network jitter and how this new method overcomes them. Examine the requirements for timeless timing attacks, attack scenarios including cross-site timing attacks, and real-world applications such as exploiting WPA2 and EAP-pwd vulnerabilities. Gain insights into the potential for bruteforcing Wi-Fi passwords using these techniques. Presented by Tom Van Goethem and Mathy Vanhoef at Black Hat, this 39-minute talk offers a comprehensive look at the future of timing attacks and their implications for cybersecurity.

Timeless Timing Attacks

Black Hat
Add to list
0:00 / 0:00