Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bypassing Encryption by Attacking the Cryptosystem Perimeter

via YouTube

Overview

Explore techniques for bypassing encryption by targeting vulnerabilities in cryptosystem perimeters in this conference talk from CYPHERCON12. Delve into methods like memory dumping, process injection, and backdooring SSH. Learn about exploiting password managers, creating DLL shells, and leveraging custom JavaScript for attacks. Gain insights on defending against these perimeter-based cryptographic vulnerabilities and strengthening overall system security.

Syllabus

Intro
Memory Dump
Process Injection
Manhook
Backdoor
SSH
Keepass
DLL Shell
Calebs Hack
Custom JavaScript
What to do

Reviews

Start your review of Bypassing Encryption by Attacking the Cryptosystem Perimeter

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.