Circumventing the Guardians - How the Security Features in State-of-the-Art TLS Inspection Solutions Can Be Exploited for Covert Data Exfiltration

Circumventing the Guardians - How the Security Features in State-of-the-Art TLS Inspection Solutions Can Be Exploited for Covert Data Exfiltration

Black Hat via YouTube Direct link

TLS Inspection Devices

6 of 18

6 of 18

TLS Inspection Devices

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Circumventing the Guardians - How the Security Features in State-of-the-Art TLS Inspection Solutions Can Be Exploited for Covert Data Exfiltration

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who am I
  3. 3 Agenda
  4. 4 Background
  5. 5 Snicket
  6. 6 TLS Inspection Devices
  7. 7 Simple TLS handshake
  8. 8 Whats next
  9. 9 Command and Control
  10. 10 Agent and C2
  11. 11 Traffic Capture
  12. 12 Core Functionality
  13. 13 Mitigation Detection
  14. 14 Conclusion
  15. 15 Sneakout
  16. 16 Demo Environment
  17. 17 Demo Client
  18. 18 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.