Главная
Study mode:
on
1
Intro
2
Public Key Crypto Refresher
3
EFF SSL Observatory
4
Back to the PKI training....
5
What's an ECA certificate?
6
Social Engineering Opportunity?
7
Social Engineering at ORC
8
Footprinting the ORC Network
9
ECA Network Security
10
Verisign ECA certificate
11
Notary Requirements
12
DoD Military Leadership
13
Additions to existing tools...
Description:
Explore the intricacies of Public Key Infrastructure (PKI) exploitation and its implications in this 45-minute conference talk. Delve into a comprehensive overview of public key cryptography, examine the EFF SSL Observatory, and understand the concept of ECA certificates. Learn about potential social engineering opportunities, including a case study at ORC. Investigate footprinting techniques for ORC networks and analyze ECA network security measures. Discover the requirements for Verisign ECA certificates and notary processes. Gain insights into DoD military leadership implications and explore additions to existing tools in the realm of PKI security.

Exploiting PKI for Fun and Profit - The Next Yellow Padlock Icon?

Add to list