Stealthier Attacks and Smarter Defending With TLS Fingerprinting

Stealthier Attacks and Smarter Defending With TLS Fingerprinting

via YouTube Direct link

Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...

25 of 33

25 of 33

Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Stealthier Attacks and Smarter Defending With TLS Fingerprinting

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Stealthier Attacks & Smarter Defending with TLS Fingerprinting
  3. 3 A "Zero Math, (almost) Zero Crypto", TLS Talk
  4. 4 TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
  5. 5 Fingerprints
  6. 6 Why
  7. 7 Origin Story
  8. 8 Expanding.
  9. 9 Extensions
  10. 10 Significant, key-value order is!
  11. 11 Creating a FingerPrint
  12. 12 Deobfuscation
  13. 13 Any Port v Stateless v Asymmetric v Low Cost v
  14. 14 Storage & Retention
  15. 15 Own Fingerprint Modification
  16. 16 Collisions?
  17. 17 Yes... ok no. sort of.... a bit.... occasionally
  18. 18 Anomaly Detection
  19. 19 Not Just
  20. 20 Attacker Level 1: Stealth MiTM
  21. 21 Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
  22. 22 TLS Attacks
  23. 23 Fingerprint Defined Routing Ž
  24. 24 Attacker Level 2: AntiForensics
  25. 25 Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
  26. 26 Fingerprint Canaries
  27. 27 Homogeneous Platforms
  28. 28 End Of Level Boss: Nation State Attackers (zomg!) ?
  29. 29 Honorable Mention: HoneyPots
  30. 30 FingerPrint DB
  31. 31 Demo?
  32. 32 What's Next?
  33. 33 Random Observations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.