Главная
Study mode:
on
1
Intro
2
Black Hat Sound Bytes
3
Disclaimer
4
The infamous TLS Handshake
5
Perfect Forward Secrecy
6
Schannel & CNG
7
Schannel Prefered Cipher Suites
8
Microsoft's TLS/SSL Docs
9
Schannel Ops
10
CNG Key Isolation
11
Background Summary
12
What are we trying to accomplish?
13
The keys? What do they get us?
14
Session Keys
15
The Norypt SSL Provider (ncryptsslp.dll)
16
Pre-Master Secret (PMS)
17
Master Secret Mapped to Unique Identifier
18
Ephemeral & Persistent Private keys
19
9 Ephemeral Private Key
20
1 Persistent Private key
21
7 Decrypting Persistent Key - DPAPI
22
Session Ticket key
23
Decrypting Session Tickets
24
Inherent Metadata TLS Provides
25
Schannel Caching Parameters
26
This is your Schannel Cache (x64)
27
Limitations
Description:
Explore the inner workings of Microsoft's Secure Channel (Schannel) SSL/TLS library in this 47-minute Black Hat conference talk. Delve into how Schannel utilizes CryptoAPI-NG (CNG) to cache various keys and session tickets for TLS/SSL connections. Examine the underlying data structures and learn techniques to extract keys and forensically relevant information about connections. Discover how to decrypt sessions using ephemeral key exchanges and understand the cache's longevity and capacity. Gain insights into Schannel's preferred cipher suites, key isolation mechanisms, and the role of the Norypt SSL Provider. Explore the decryption of persistent keys using DPAPI and session tickets, while also considering the inherent metadata TLS provides and the limitations of Schannel caching.

Cunning With CNG - Soliciting Secrets From Schannel

Black Hat
Add to list
0:00 / 0:00