Главная
Study mode:
on
1
Introduction
2
Who are we
3
HTTPS is broken
4
Overview
5
Original Research
6
Breach Assumptions
7
Methodology
8
Other Contributions
9
Alternative Secrets
10
Call Methods
11
Artificial Noise
12
New Block
13
Noises
14
Optimizations
15
Example
16
Requests Soup
17
Browser Polarization
18
Rupture
19
Rapture Components
20
Attack Diagram
21
Persistence
22
Repo
23
Backend
24
Lengths
25
Mitigation
26
First Party Cookies
27
Future Work
28
Takeaways
29
Questions
Description:
Explore new developments in the BREACH attack on SSL connections in this 53-minute Black Hat conference talk. Learn about practical extensions to the attack against common encryption ciphers, command-and-control techniques for exploiting plain HTTP connections, and statistical methods to bypass noise in block ciphers and web applications. Discover parallelization and optimization techniques, novel mitigation strategies, and a tool implementation with experimental results on popular web services. Gain insights into HTTPS vulnerabilities, alternative secrets, artificial noise, browser polarization, and persistence methods. Understand the implications for first-party cookies and future cybersecurity challenges.

Practical New Developments in The Breach Attack

Black Hat
Add to list