Главная
Study mode:
on
1
Introduction
2
Welcome
3
Teaser
4
Outline
5
PAC Refresher
6
PAC Configuration
7
HTTP subversion with malicious pack
8
Find proxy for URL
9
Mentions
10
Ingredients
11
Demo
12
Fine Print
13
Conclusion
14
Malware Watch
15
PAC Capabilities
16
Download Protocol
17
Message Length
18
Demonstration
19
Recap
20
Matrix
21
Remediation
22
Secure PAC
23
Conclusions
Description:
Explore the vulnerabilities of HTTPS connections through malicious Proxy AutoConfiguration (PAC) resources in this Black Hat conference talk. Delve into how seemingly secure HTTPS traffic can be compromised, even when browsing HSTS sites or using "Force TLS/SSL" browser extensions. Learn about the concept of "PAC Malware" and its capabilities, including two-way communication channels, contextual phishing, denial-of-service options, and sensitive data extraction from URIs. Examine a comprehensive browser PAC feature matrix and understand the cross-platform and cross-browser implications of this threat. Discover potential remediation strategies and secure PAC implementations to protect against these vulnerabilities.

Crippling HTTPS with Unholy PAC

Black Hat
Add to list
0:00 / 0:00