Breaking Binary Protocols and Bad Crypto

Breaking Binary Protocols and Bad Crypto

Security BSides London via YouTube Direct link

Background Information

2 of 25

2 of 25

Background Information

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking Binary Protocols and Bad Crypto

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Background Information
  3. 3 First Light
  4. 4 History
  5. 5 Initial approach
  6. 6 DB9 connector
  7. 7 TCP ports
  8. 8 Console management
  9. 9 Reverse engineering
  10. 10 Validation
  11. 11 SSL
  12. 12 Diffie
  13. 13 Tiffany Hellman
  14. 14 Lunge
  15. 15 My favorite gift
  16. 16 Im lazy
  17. 17 Analyzing the traffic
  18. 18 Analyzing the payload
  19. 19 Crypto classification
  20. 20 Differential cryptanalysis
  21. 21 Packet structure
  22. 22 Packet encryption
  23. 23 HTTP encryption
  24. 24 Session IDs
  25. 25 Any questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.