Главная
Study mode:
on
1
Intro
2
What are we going to do
3
TLS Security
4
TLS Truncation Attack
5
Why Does This Work
6
Challenges in Web Development
7
Setup
8
Honest User
9
Edit Account Information
10
Access Email Account
11
What Went Wrong
12
What Im Wrong
13
Google
14
Summary
15
Questions
Description:
Explore a critical security vulnerability in web applications through this Black Hat USA 2013 conference talk. Delve into the world of TLS truncation attacks and their potential to exploit logical flaws, leading to a desynchronization between user and server perspectives of an application's state. Discover how these attacks can be leveraged to compromise authentication systems, including real-world examples of exploiting the Helios electronic voting system, taking control of Microsoft Live accounts, and gaining temporary access to Google accounts. Learn about the challenges in web development that contribute to these vulnerabilities and gain insights into the setup, execution, and implications of such attacks. Understand the importance of addressing these security issues to protect web applications and user data.

Truncating TLS Connections to Violate Beliefs in Web Applications

Black Hat
Add to list