Overview
Syllabus
Intro
Stealthier Attacks & Smarter Defending with TLS Fingerprinting
A "Zero Math, (almost) Zero Crypto", TLS Talk
TLS PRIMER ..... (Shhhh.... it's not a cryptographic algorithm)
Fingerprints
Why
Origin Story
Expanding.
Extensions
Significant, key-value order is!
Creating a FingerPrint
Deobfuscation
Any Port v Stateless v Asymmetric v Low Cost v
Storage & Retention
Own Fingerprint Modification
Collisions?
Yes... ok no. sort of.... a bit.... occasionally
Anomaly Detection
Not Just
Attacker Level 1: Stealth MiTM
Hacked Proxy BGP Hijacking Rogue DHCP Malicious Tor Node
TLS Attacks
Fingerprint Defined Routing Ž
Attacker Level 2: AntiForensics
Enumerated Targets Prepared Exploits Delivered Stager/Phish v Awaiting Callback...
Fingerprint Canaries
Homogeneous Platforms
End Of Level Boss: Nation State Attackers (zomg!) ?
Honorable Mention: HoneyPots
FingerPrint DB
Demo?
What's Next?
Random Observations