Introduction
Back in 2012, when Juliano Rizzo and Thai Duong announced the CRIME
attack, a TLS / SSL Compression attack against HTTPS, the ability to
recover selected parts of the traffic through side channel attacks was
proven. This attack was mitigated by disabling the TLS / SSL level
compression for most of the browsers. This year at Black Hat, a new
attack called BREACH (browser reconnaissance and exfiltration via
adaptive compression of hypertext) was announced and it commanded the
attention of entire industry. This presentation, titled “SSL Gone in 30
seconds,” is not properly understood and hence there seems to be some
confusion about how to mitigate the problem. So I felt that this article
should give some detailed insight into how notorious the attack is, how
it works, how practical it is, and what needs to be done to mitigate
it. So let’s have a look
==> Read More
Monday, October 14, 2013
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
No comments:
Post a Comment