Completed
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Stealthier Attacks and Smarter Defending With TLS Fingerprinting
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Stealthier Attacks & Smarter Defending with TLS Fingerprinting
- 3 A "Zero Math, (almost) Zero Crypto", TLS Talk
- 4 TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
- 5 Fingerprints
- 6 Why
- 7 Origin Story
- 8 Expanding.
- 9 Extensions
- 10 Significant, key-value order is!
- 11 Creating a FingerPrint
- 12 Deobfuscation
- 13 Any Port v Stateless v Asymmetric v Low Cost v
- 14 Storage & Retention
- 15 Own Fingerprint Modification
- 16 Collisions?
- 17 Yes... ok no. sort of.... a bit.... occasionally
- 18 Anomaly Detection
- 19 Not Just
- 20 Attacker Level 1: Stealth MiTM
- 21 Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
- 22 TLS Attacks
- 23 Fingerprint Defined Routing Ž
- 24 Attacker Level 2: AntiForensics
- 25 Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
- 26 Fingerprint Canaries
- 27 Homogeneous Platforms
- 28 End Of Level Boss: Nation State Attackers (zomg!) ?
- 29 Honorable Mention: HoneyPots
- 30 FingerPrint DB
- 31 Demo?
- 32 What's Next?
- 33 Random Observations