Главная
Study mode:
on
1
Introduction
2
Background Information
3
First Light
4
History
5
Initial approach
6
DB9 connector
7
TCP ports
8
Console management
9
Reverse engineering
10
Validation
11
SSL
12
Diffie
13
Tiffany Hellman
14
Lunge
15
My favorite gift
16
Im lazy
17
Analyzing the traffic
18
Analyzing the payload
19
Crypto classification
20
Differential cryptanalysis
21
Packet structure
22
Packet encryption
23
HTTP encryption
24
Session IDs
25
Any questions
Description:
Explore the process of reverse-engineering and exploiting network devices in this 44-minute Security BSides London talk. Delve into Graham Sutherland's journey from having little knowledge of a widely deployed system to developing powerful exploits. Learn techniques for analyzing and attacking binary protocols, including a method for classifying and identifying unknown cryptography. Gain insights into the initial approach, reverse engineering process, and crypto classification. Discover how to analyze traffic, payloads, and packet structures. Understand the importance of differential cryptanalysis and packet encryption. Follow along as Sutherland shares his experiences with SSL, Diffie-Hellman, and HTTP encryption. Perfect for security professionals and enthusiasts looking to enhance their skills in breaking binary protocols and bad crypto.

Breaking Binary Protocols and Bad Crypto

Security BSides London
Add to list