SlideShare a Scribd company logo
1 of 38
Download to read offline
Bettercrypto - Applied Crypto Hardening for 
Sysadmins 
Attacks 
Aaron Zauner 
azet@azet.org 
BetterCrypto.org 
Hack.lu - 21/10/2014
Internet Dark Ages 
I SSLv1 engineered at Netscape, never released to the public 
I Kipp Hickman of Netscape introduces SSLv2 as an IETF draft 
back in 1995: 
The SSL Protocol is designed to provide privacy 
between two communicating applications (a client 
and a server). Second, the protocol is designed 
to authenticate the server, and optionally the 
client. [...] 
http://tools.ietf.org/html/draft-hickman-netscape-ssl-00 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 1/36
Internet Dark Ages 
I SSLv2 was fundamentally broken and badly designed. 
Basically full loss of Confidentiallity and integrity of on-wire 
data thus susceptible to MITM attacks, see: 
http://osvdb.org/56387 
I CipherSpec is sent in the clear 
I Size of Block-cipher padding is sent in the clear 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 2/36
Internet Dark Ages 
I SSLv3 was introduced in 1996 by Paul Kocher, Phil Karlton 
and Alan Freier, utilizing an algoritm by Taher ElGamal, a 
known cryptographer and Chief Scientist at Netscape at the 
time: https://tools.ietf.org/html/rfc6101 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 3/36
Internet Dark Ages 
On a side note; back then the choice algorithms was limited and 
export ciphers (low security) common as recommended by NSA and 
mandated by US law. Google: “Bernstein vs. United States” 
I encryption algorithms (Confidentiality): NULL, 
FORTEZZA-CBC (NSA), IDEA-CBC, RC2-CBC-40 (40bit 
security), RC4-128, DES40-CBC (40bit security), DES-CBC 
(56bit security), Triple-DES-EDE-CBC 
I hash functions (integrity): NULL, MD5 and SHA 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 4/36
Internet Dark Ages 
David Wagner and Bruce Schneier publish a paper entitled 
“Analysis of the SSL 3.0 protocol”: 
I Keyexchange algorithm rollback 
I Protocol fallback to SSLv2 
I Protocol leaks known plaintexts - may be used in cryptanalysis 
I Replay attacks on Anonymous DH (don’t use it anyway!) 
https://www.schneier.com/paper-ssl.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 5/36
TLS appears 
1999. The SSL protocol is renamed to TLS (version 1) with little 
improvements over SSLv3. The spec. is almost identical. 
I Diffie-Hellman, DSS and Triple-DES are now required by 
implementors 
I most SSLv3 security issues are still present in TLS 1.0 
(RFC2246) 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 6/36
TLS gets padding attacks 
2002. Vaudenay publishes a paper entitled “Security Flaws Induced 
by CBC Padding Applications to SSL, IPSEC, WTLS...” 
I Side-channel attack on CBC mode padding 
I valid/invalid padding causes different reactions 
I can be used to influence decryption operations 
I introduces “padding oracle attacks” in SSL 
http://www.iacr.org/cryptodb/archive/2002/EUROCRYPT/2850/2850.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 7/36
TLS gets extended 
2003. TLS extensions get specified in RFC3546. 
I General: Extended Handshake, ClientHello and ServerHello 
I Server Name Indication (SNI) for virtual hosting 
(SNI leaks metadata!) 
I Certificate Status Request (CSR) support via OCSP 
I (...) 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 8/36
TLS gets timing attacks 
2003. Brumley and Boneh publish a paper entitled “Remote timing 
attacks are practical”. 
Timing attack on RSA in SSL/TLS implementations (OpenSSL): 
I Send specially crafted ClientKeyExchange message 
I Mesure time between ClienyKeyExchange and Alert response 
I do a bit of statistics 
I retrieve Private Key 
http://dl.acm.org/citation.cfm?id=1251354 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 9/36
TLS gets padding oracle password retrieval 
2003. Canvel, Hiltgen, Vaudenay, Vuagnoux publish “Password 
Interception in a SSL/TLS Channel”. 
Extend earlier work of Vaudenay and successfully intercept IMAP 
passwords in TLS channels. 
http://www.iacr.org/cryptodb/archive/2003/CRYPTO/1069/1069.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 10/36
TLS gets chosen plaintext attacks 
2004 & 2006. Bard demonstrates Chosen-Plaintext Attacks against 
SSL and TLS1.0 
Attack on CBC: 
I CBC exchanges an Initialization Vector (IV) during Handshake 
I these IVs turn out to be predictable 
I PINs and Passwords can be decrypted 
I VPNs/Proxies can also be used to accomplish this task 
https://eprint.iacr.org/2004/111 
https://eprint.iacr.org/2006/136 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 11/36
TLS gets updated 
2006. A new TLS protocol version is standardized: TLS 1.1 
I EXPORT ciphers removed 
I Session resumption 
I Protection against the CBC attacks by Bard 
I IANA TLS parameters standardized 
I (...) 
(RFC4346) 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 12/36
TLS gets modern crypto 
2008. A new TLS protocol version is standardized: TLS 1.2 
I MD5/SHA1 removed as pseudorandom function (PRF) 
I configurable PRFs in ciphersuites (e.g. SHA256) 
I Authenticated encryption: CCM, GCM 
I AES ciphersuites 
I (...) 
(RFC5246) 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 13/36
Rouge CA Certificates 
2008. Sotirov, Stevens, Appelbaum, Lenstra, Molnar, Osvik and de 
Weger present a paper based on earlier work by Lenstra et al. at 
25c3 entitled “MD5 considered harmful today” 
I MD5 Hash-collision of a CA Certificate 
I Create colliding (rouge) CA Certificates 
I Generate any Certificate for MITM you want 
http://www.win.tue.nl/hashclash/rogue-ca/ 
https://www.youtube.com/watch?v=PQcWyDgGUVg 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 14/36
sslstrip 
2009. Moxie Marlinspike releases sslstrip at BlackHat DC 2009. 
I Client connects to server 
I Attacker intercepts session via MITM 
I Attacker sends HTTP 301 (moved permanently) 
I Attacker forwards requests to/from server via SSL/TLS 
I Client receives data via unencrypted channel 
I Attacker reads plaintext 
http://www.thoughtcrime.org/software/sslstrip 
http://vimeo.com/50018478 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 15/36
Null-prefix attacks against Certificates 
2009. Moxie Marlinspike publishes “Null prefix Attacks against 
SSL/TLS Certificates”. 
I Specially crafted domain strings trick CA checking 
I null-terminate stuff in a domain name 
I ex.: www.paypal.com0.thoughtcrime.org is valid 
I ex.: *0.thoughtcrime.org is valid 
I CA ignores prefix 
I Client does not -> Certificate valid for prefix 
Moxie updated his sslsniff project to carry out this attack. 
http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf 
http://thoughtcrime.org/software/sslsniff 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 16/36
SSLv2 Forbidden 
2011. IETF publishes and standardized a RFC to prohibit 
negotiation and thus compatibility of SSLv2 in TLS1.0-1.2 entirely. 
https://tools.ietf.org/html/rfc6176 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 17/36
Comodo 
2011. Comodo CA: Attacker issues 9 certificates via reseller account 
for popular domains (google.com, yahoo.com, live.com, skype.com [...]) 
https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 18/36
BEAST 
2011. Doung and Rizzo publish the BEAST attack at ekoparty and 
demo a live attack on PayPal. Based on Bards earlier work on 
predictable IVs in CBC: 
I Phishing gets victim to visit a certain website 
I Script on said website makes request to genuine site 
I Attacker records encrypted cookie information 
I Tries to guess session-cookie with known CBC attack 
Same Origin Policy (SOP) forbids this attack in client software. If 
SOP can be bypassed (as shown by the authors with Java’s SOP) 
this attack is still practical. 
http://vnhacker.blogspot.co.at/2011/09/beast.html 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 19/36
Trustwave 
2012. Trustwave CA: Trustwave sells subordinate CAs to big 
corporations to be used for Deep Packet Inspection. 
A sub-CA can issue and fake any certificate for MITM attacks. 
http://blog.spiderlabs.com/2012/02/clarifying-the-trustwave-ca-policy-update.html 
http://arstechnica.com/business/2012/02/ 
critics-slam-ssl-authority-for-minting-cert-used-to-impersonate-sites/ 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 20/36
DigiNotar 
2012. DigiNotar CA: Attackers compromise DigiNotar in it’s 
entirety. 
I attackers generate tons of certificates 
I Google Chromes certificate store detects mismatches 
I DigiNotar acknowledges breach 
I DigiNotar files for bankrupcy 
I FOX-IT never gets paid for the investigation 
https://en.wikipedia.org/wiki/DigiNotar 
http://cryptome.org/0005/diginotar-insec.pdf 
http://nakedsecurity.sophos.com/2011/09/05/ 
operation-black-tulip-fox-its-report-on-the-diginotar-breach 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 21/36
Certificate validation in non-browser software 
2012. Georgiev, Iyengar, Jana, Anubhai, Boneh and Shmatikov 
publish a paper entitled “The most dangerous code in the world: 
validating SSL certificates in non-browser software” 
Certificate validation vulnerabilities in: 
I OpenSSL 
I GnuTLS 
I JSSE 
I EC2 Java libraries & Amazon SDKs 
I PayPal SDKs 
I eCommerce/WebShop software 
I ..cURL, PHP, Python, tons of Java middleware 
https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 22/36
CRIME 
2012. Doung and Rizzo publish an attack against TLS Compression 
and SPDY titled CRIME. 
I MITM attacker sees length of compressed ciphertext 
I compression has direct affect on the length 
I attacker makes client compress/encrypt data (or uses known 
data) with secret data 
I attacker compares 
I correct guesses yield shorter messages due to compression 
I repeat until done 
This is only feasible for small amounts of data, e.g. session strings, 
cookies and so forth. 
https://isecpartners.com/blog/2012/september/details-on-the-crime-attack.aspx 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 23/36
TIME 
2013. Be’ery and Shulman present TIME at BlackHat Europe. 
Extend on the CRIME Attack: 
I Attacker generates HTTP requests (XSS, injection,..) 
I Attacker exploits SOP design flaw and measures RTT 
differences 
I determines correct or failed guesses by SOP timing leak 
https://media.blackhat.com/eu-13/briefings/Beery/bh-eu-13-a-perfect-crime-beery-wp.pdf 
https://www.youtube.com/watch?v=rTIpFfTp3-w 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 24/36
Lucky13 
2013. AlFardan and Paterson present a novel attack against CBC 
for TLS and DTLS based on timing analysis. 
I Attacker intercepts and modifies a message including padding 
I Attacker tempers with the padding of the message 
I MAC computation takes longer during decryption process 
I Attacker repeats and measures 
I Attacker performs padding oracle attack described earlier 
I (Extremely latency sensitive attack) 
http://www.isg.rhul.ac.uk/tls/Lucky13.html 
http://www.isg.rhul.ac.uk/tls/TLStiming.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 25/36
RC4 Biases 
2013. AlFardan, Bernstein, Paterson, Poettering and Schuldt 
publish a generic attack on the RC4 cipher for TLS and WPA. 
I Statistical biases in the first 257 bytes of ciphertext 
I Recovery of the first 200 bytes after 228 to 232 encryption 
operations of the same plaintext 
I A broadcast attack: mounted on unique keys 
I May also be mounted with a single key with repeating target 
plaintexts 
I Only feasible for large amounts of data and very time 
consuming 
http://www.isg.rhul.ac.uk/tls 
http://www.isg.rhul.ac.uk/tls/RC4biases.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 26/36
NIST curves 
2013 & 2014. Daniel J. Bernstein and Tanja Lange voice concern 
about the NIST Elliptic Cuves that are widely implemented and 
used in TLS for ECDH and ECDSA 
I NIST curves defined on recommendations by NSA’s Jerry 
Solinas 
I Unclear why these curves and their parameters were chosen 
I NIST cites efficiency: more efficient and secure curves 
available 
I Possible mathematical backdoor through previous analysis and 
carefully chosen and unexplained parameters 
I Start SafeCurves project (ongoing) 
http://www.hyperelliptic.org/tanja/vortraege/20130531.pdf 
http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf 
http://safecurves.cr.yp.to 
https://archive.org/details/ShmooCon2014_SafeCurves 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 27/36
BREACH 
2013. Gluck, Harris and Prado demonstrate yet another attack 
based on CRIME at BlackHat USA. 
Very similar to CRIME but the attack works based on information 
leaks from HTTP compression instead of TLS compression. 
http://breachattack.com 
https://www.youtube.com/watch?v=CoNKarq1IYA 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 28/36
Unused Certificates in Truststores 
2014. Perl, Fahl, Smith publish a paper entitled “You Won’t Be 
Needing These Any More: On Removing Unused Certificates From 
Trust Stores” 
I Compared 48 mio. HTTP certificates 
I 140 CA Certificates are unused in all major trust stores 
I Of 426 trusted root certificates only 66% are even used 
http://fc14.ifca.ai/papers/fc14_submission_100.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 29/36
Triple Handshakes Considered Harmful 
2014. Bhargavan, Delignat-Lavaud, Pironti, Langley and Ray 
present an attack one day before the IETF’89 meeting in London. 
I Limited to client-certificate authentication with renegotiation 
I MITM attack on renegotiation with a three-way handshake 
I Variations of the attack also discussed on their website 
I Can’t possibly fit this into one slide, homework: understand the 
attack by reading their excellent description on the website 
https://secure-resumption.com 
https://secure-resumption.com/IETF-triple-handshakes.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 30/36
Frankencerts 
2014. Brubaker, Jana, Ray, Khurshid and Shmatikovy publish a 
paper entitled “Using Frankencerts for Automated Adversarial 
Testing of Certificate Validation in SSL/TLS Implementations” 
I Fuzzing of X.509 related code in all major implementations 
shows serious weaknesses in certificate validation and handling 
I OpenSSL, NSS, GnuTLS, MatrixSSL, PolarSSL, CyaSSL, 
cyptlib [...] 
https://www.cs.utexas.edu/~shmat/shmat_oak14.pdf 
https://github.com/sumanj/frankencert 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 31/36
Heartbleed 
2014. Heartbleed is independently discovered by Codenomicon and 
a Google Security engineer. 
Faulty implementation in OpenSSL of the TLS Heartbleed 
extension leaks memory content over the wire. This has been all 
over the media and discussed in detail all over the internet. People 
have successfully extracted sensitive information (password files et 
cetera) from victim memory. 
I wrote an nmap plugin to scan for Heartbleed: 
https://github.com/azet/nmap-heartbleed 
http://heartbleed.com 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 32/36
Virtual Host Confusion 
2014. At BlackHat Delignat-Lavaud presents an attack based on 
SSLv3 downgrade and sharing of session caches 
I Attacker forces downgrade to SSLv3 
I For SSLv3: larger deployments share session caches 
I attacker exploits a server vulnerability where session caches 
are reused 
I attacker requests different subdomain with SSLv3 using the 
same session 
I vulnerable server will allow connection w/o authentication 
I www.company.com vs git.company.com 
https://bh.ht.vc 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 33/36
POODLE 
2014. POODLE: Padding Oracle On Downgraded Legacy 
Encryption - OpenSSL/Google 
I MITM attacker downgrades to SSLv3 (once again) 
I attacker does block duplication 
I takes on average 256 requests to decrypt 1 byte (!) 
I disabling SSLv3 or using the FALLBACK_SCSV TLS 
extension (draft) mitigates this issue entirely 
https://www.openssl.org/~bodo/ssl-poodle.pdf 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 34/36
Implementation Issues 
There are tons of other issues with TLS stacks and software 
implementations that have not been discussed. 
OpenSSL alone published 24 security advisories in 2014 until 
today. 
I Apple’s GOTO fail 
I GnuTLS GOTO fail 
I various GnuTLS vulnerabilities 
I wrong use of OpenSSL API in server and client software 
... 
Clearly; a lot of people current have their eyes on this very topic. 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 35/36
Implementation Issues 
For this crowd: It’s up to you to find them and improve existing 
implementations, protocols and standards. 
Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins 
Aaron Zauner 36/36

More Related Content

What's hot

[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...CODE BLUE
 
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun YenCODE BLUE
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramOpenDNS
 
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...CODE BLUE
 
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019kieranjacobsen
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
F5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transitionF5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transitionDmitry Tikhovich
 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsAPNIC
 
Assume Compromise
Assume CompromiseAssume Compromise
Assume CompromiseZach Grace
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat Security Conference
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksPriyanka Aash
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThierry Zoller
 
Cracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless NetworksCracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless Networksguestf2e41
 
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)Igalia
 
Detection index learning based on cyber threat intelligence and its applicati...
Detection index learning based on cyber threat intelligence and its applicati...Detection index learning based on cyber threat intelligence and its applicati...
Detection index learning based on cyber threat intelligence and its applicati...CODE BLUE
 

What's hot (20)

[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
 
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
 
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
 
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
F5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transitionF5 EMEA Webinar Oct'15: http2 how to ease the transition
F5 EMEA Webinar Oct'15: http2 how to ease the transition
 
2013 april-screen
2013 april-screen2013 april-screen
2013 april-screen
 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my Honeypots
 
Assume Compromise
Assume CompromiseAssume Compromise
Assume Compromise
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explained
 
Cracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless NetworksCracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless Networks
 
Python Cryptography & Security
Python Cryptography & SecurityPython Cryptography & Security
Python Cryptography & Security
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Network Security
Network SecurityNetwork Security
Network Security
 
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
 
Detection index learning based on cyber threat intelligence and its applicati...
Detection index learning based on cyber threat intelligence and its applicati...Detection index learning based on cyber threat intelligence and its applicati...
Detection index learning based on cyber threat intelligence and its applicati...
 

Similar to Applied Crypto Hardening for Sysadmins

Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)xsist10
 
Days of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, IncidentsDays of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, IncidentsAnton Chuvakin
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)Igalia
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vandaVanda KANY
 
Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conferencexsist10
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
 
Security Theatre - Confoo
Security Theatre - ConfooSecurity Theatre - Confoo
Security Theatre - Confooxsist10
 
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersphosika sithisane
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Florin D. Tanasache
 

Similar to Applied Crypto Hardening for Sysadmins (20)

Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)Security Theatre (PHP Leuven)
Security Theatre (PHP Leuven)
 
Basics of ssl
Basics of sslBasics of ssl
Basics of ssl
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
Days of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, IncidentsDays of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, Incidents
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
Security Theatre - Confoo
Security Theatre - ConfooSecurity Theatre - Confoo
Security Theatre - Confoo
 
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 

More from Aaron Zauner

Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...Aaron Zauner
 
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...Aaron Zauner
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...Aaron Zauner
 
State of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeState of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeAaron Zauner
 
Javascript Object Signing & Encryption
Javascript Object Signing & EncryptionJavascript Object Signing & Encryption
Javascript Object Signing & EncryptionAaron Zauner
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Aaron Zauner
 
Beautiful Bash: Let's make reading and writing bash scripts fun again!
Beautiful Bash: Let's make reading and writing bash scripts fun again!Beautiful Bash: Let's make reading and writing bash scripts fun again!
Beautiful Bash: Let's make reading and writing bash scripts fun again!Aaron Zauner
 
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014[IETF Part] BetterCrypto Workshop @ Hack.lu 2014
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014Aaron Zauner
 
BetterCrypto: Applied Crypto Hardening
BetterCrypto: Applied Crypto HardeningBetterCrypto: Applied Crypto Hardening
BetterCrypto: Applied Crypto HardeningAaron Zauner
 
How to save the environment
How to save the environmentHow to save the environment
How to save the environmentAaron Zauner
 
Sc12 workshop-writeup
Sc12 workshop-writeupSc12 workshop-writeup
Sc12 workshop-writeupAaron Zauner
 

More from Aaron Zauner (11)

Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...
Because "use urandom" isn't everything: a deep dive into CSPRNGs in Operating...
 
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
 
State of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeState of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at Large
 
Javascript Object Signing & Encryption
Javascript Object Signing & EncryptionJavascript Object Signing & Encryption
Javascript Object Signing & Encryption
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)
 
Beautiful Bash: Let's make reading and writing bash scripts fun again!
Beautiful Bash: Let's make reading and writing bash scripts fun again!Beautiful Bash: Let's make reading and writing bash scripts fun again!
Beautiful Bash: Let's make reading and writing bash scripts fun again!
 
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014[IETF Part] BetterCrypto Workshop @ Hack.lu 2014
[IETF Part] BetterCrypto Workshop @ Hack.lu 2014
 
BetterCrypto: Applied Crypto Hardening
BetterCrypto: Applied Crypto HardeningBetterCrypto: Applied Crypto Hardening
BetterCrypto: Applied Crypto Hardening
 
How to save the environment
How to save the environmentHow to save the environment
How to save the environment
 
Sc12 workshop-writeup
Sc12 workshop-writeupSc12 workshop-writeup
Sc12 workshop-writeup
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Applied Crypto Hardening for Sysadmins

  • 1. Bettercrypto - Applied Crypto Hardening for Sysadmins Attacks Aaron Zauner azet@azet.org BetterCrypto.org Hack.lu - 21/10/2014
  • 2.
  • 3. Internet Dark Ages I SSLv1 engineered at Netscape, never released to the public I Kipp Hickman of Netscape introduces SSLv2 as an IETF draft back in 1995: The SSL Protocol is designed to provide privacy between two communicating applications (a client and a server). Second, the protocol is designed to authenticate the server, and optionally the client. [...] http://tools.ietf.org/html/draft-hickman-netscape-ssl-00 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 1/36
  • 4. Internet Dark Ages I SSLv2 was fundamentally broken and badly designed. Basically full loss of Confidentiallity and integrity of on-wire data thus susceptible to MITM attacks, see: http://osvdb.org/56387 I CipherSpec is sent in the clear I Size of Block-cipher padding is sent in the clear Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 2/36
  • 5. Internet Dark Ages I SSLv3 was introduced in 1996 by Paul Kocher, Phil Karlton and Alan Freier, utilizing an algoritm by Taher ElGamal, a known cryptographer and Chief Scientist at Netscape at the time: https://tools.ietf.org/html/rfc6101 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 3/36
  • 6. Internet Dark Ages On a side note; back then the choice algorithms was limited and export ciphers (low security) common as recommended by NSA and mandated by US law. Google: “Bernstein vs. United States” I encryption algorithms (Confidentiality): NULL, FORTEZZA-CBC (NSA), IDEA-CBC, RC2-CBC-40 (40bit security), RC4-128, DES40-CBC (40bit security), DES-CBC (56bit security), Triple-DES-EDE-CBC I hash functions (integrity): NULL, MD5 and SHA Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 4/36
  • 7. Internet Dark Ages David Wagner and Bruce Schneier publish a paper entitled “Analysis of the SSL 3.0 protocol”: I Keyexchange algorithm rollback I Protocol fallback to SSLv2 I Protocol leaks known plaintexts - may be used in cryptanalysis I Replay attacks on Anonymous DH (don’t use it anyway!) https://www.schneier.com/paper-ssl.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 5/36
  • 8. TLS appears 1999. The SSL protocol is renamed to TLS (version 1) with little improvements over SSLv3. The spec. is almost identical. I Diffie-Hellman, DSS and Triple-DES are now required by implementors I most SSLv3 security issues are still present in TLS 1.0 (RFC2246) Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 6/36
  • 9. TLS gets padding attacks 2002. Vaudenay publishes a paper entitled “Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS...” I Side-channel attack on CBC mode padding I valid/invalid padding causes different reactions I can be used to influence decryption operations I introduces “padding oracle attacks” in SSL http://www.iacr.org/cryptodb/archive/2002/EUROCRYPT/2850/2850.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 7/36
  • 10. TLS gets extended 2003. TLS extensions get specified in RFC3546. I General: Extended Handshake, ClientHello and ServerHello I Server Name Indication (SNI) for virtual hosting (SNI leaks metadata!) I Certificate Status Request (CSR) support via OCSP I (...) Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 8/36
  • 11. TLS gets timing attacks 2003. Brumley and Boneh publish a paper entitled “Remote timing attacks are practical”. Timing attack on RSA in SSL/TLS implementations (OpenSSL): I Send specially crafted ClientKeyExchange message I Mesure time between ClienyKeyExchange and Alert response I do a bit of statistics I retrieve Private Key http://dl.acm.org/citation.cfm?id=1251354 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 9/36
  • 12. TLS gets padding oracle password retrieval 2003. Canvel, Hiltgen, Vaudenay, Vuagnoux publish “Password Interception in a SSL/TLS Channel”. Extend earlier work of Vaudenay and successfully intercept IMAP passwords in TLS channels. http://www.iacr.org/cryptodb/archive/2003/CRYPTO/1069/1069.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 10/36
  • 13. TLS gets chosen plaintext attacks 2004 & 2006. Bard demonstrates Chosen-Plaintext Attacks against SSL and TLS1.0 Attack on CBC: I CBC exchanges an Initialization Vector (IV) during Handshake I these IVs turn out to be predictable I PINs and Passwords can be decrypted I VPNs/Proxies can also be used to accomplish this task https://eprint.iacr.org/2004/111 https://eprint.iacr.org/2006/136 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 11/36
  • 14. TLS gets updated 2006. A new TLS protocol version is standardized: TLS 1.1 I EXPORT ciphers removed I Session resumption I Protection against the CBC attacks by Bard I IANA TLS parameters standardized I (...) (RFC4346) Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 12/36
  • 15. TLS gets modern crypto 2008. A new TLS protocol version is standardized: TLS 1.2 I MD5/SHA1 removed as pseudorandom function (PRF) I configurable PRFs in ciphersuites (e.g. SHA256) I Authenticated encryption: CCM, GCM I AES ciphersuites I (...) (RFC5246) Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 13/36
  • 16. Rouge CA Certificates 2008. Sotirov, Stevens, Appelbaum, Lenstra, Molnar, Osvik and de Weger present a paper based on earlier work by Lenstra et al. at 25c3 entitled “MD5 considered harmful today” I MD5 Hash-collision of a CA Certificate I Create colliding (rouge) CA Certificates I Generate any Certificate for MITM you want http://www.win.tue.nl/hashclash/rogue-ca/ https://www.youtube.com/watch?v=PQcWyDgGUVg Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 14/36
  • 17. sslstrip 2009. Moxie Marlinspike releases sslstrip at BlackHat DC 2009. I Client connects to server I Attacker intercepts session via MITM I Attacker sends HTTP 301 (moved permanently) I Attacker forwards requests to/from server via SSL/TLS I Client receives data via unencrypted channel I Attacker reads plaintext http://www.thoughtcrime.org/software/sslstrip http://vimeo.com/50018478 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 15/36
  • 18. Null-prefix attacks against Certificates 2009. Moxie Marlinspike publishes “Null prefix Attacks against SSL/TLS Certificates”. I Specially crafted domain strings trick CA checking I null-terminate stuff in a domain name I ex.: www.paypal.com0.thoughtcrime.org is valid I ex.: *0.thoughtcrime.org is valid I CA ignores prefix I Client does not -> Certificate valid for prefix Moxie updated his sslsniff project to carry out this attack. http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf http://thoughtcrime.org/software/sslsniff Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 16/36
  • 19. SSLv2 Forbidden 2011. IETF publishes and standardized a RFC to prohibit negotiation and thus compatibility of SSLv2 in TLS1.0-1.2 entirely. https://tools.ietf.org/html/rfc6176 Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 17/36
  • 20. Comodo 2011. Comodo CA: Attacker issues 9 certificates via reseller account for popular domains (google.com, yahoo.com, live.com, skype.com [...]) https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 18/36
  • 21. BEAST 2011. Doung and Rizzo publish the BEAST attack at ekoparty and demo a live attack on PayPal. Based on Bards earlier work on predictable IVs in CBC: I Phishing gets victim to visit a certain website I Script on said website makes request to genuine site I Attacker records encrypted cookie information I Tries to guess session-cookie with known CBC attack Same Origin Policy (SOP) forbids this attack in client software. If SOP can be bypassed (as shown by the authors with Java’s SOP) this attack is still practical. http://vnhacker.blogspot.co.at/2011/09/beast.html Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 19/36
  • 22. Trustwave 2012. Trustwave CA: Trustwave sells subordinate CAs to big corporations to be used for Deep Packet Inspection. A sub-CA can issue and fake any certificate for MITM attacks. http://blog.spiderlabs.com/2012/02/clarifying-the-trustwave-ca-policy-update.html http://arstechnica.com/business/2012/02/ critics-slam-ssl-authority-for-minting-cert-used-to-impersonate-sites/ Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 20/36
  • 23. DigiNotar 2012. DigiNotar CA: Attackers compromise DigiNotar in it’s entirety. I attackers generate tons of certificates I Google Chromes certificate store detects mismatches I DigiNotar acknowledges breach I DigiNotar files for bankrupcy I FOX-IT never gets paid for the investigation https://en.wikipedia.org/wiki/DigiNotar http://cryptome.org/0005/diginotar-insec.pdf http://nakedsecurity.sophos.com/2011/09/05/ operation-black-tulip-fox-its-report-on-the-diginotar-breach Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 21/36
  • 24. Certificate validation in non-browser software 2012. Georgiev, Iyengar, Jana, Anubhai, Boneh and Shmatikov publish a paper entitled “The most dangerous code in the world: validating SSL certificates in non-browser software” Certificate validation vulnerabilities in: I OpenSSL I GnuTLS I JSSE I EC2 Java libraries & Amazon SDKs I PayPal SDKs I eCommerce/WebShop software I ..cURL, PHP, Python, tons of Java middleware https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 22/36
  • 25. CRIME 2012. Doung and Rizzo publish an attack against TLS Compression and SPDY titled CRIME. I MITM attacker sees length of compressed ciphertext I compression has direct affect on the length I attacker makes client compress/encrypt data (or uses known data) with secret data I attacker compares I correct guesses yield shorter messages due to compression I repeat until done This is only feasible for small amounts of data, e.g. session strings, cookies and so forth. https://isecpartners.com/blog/2012/september/details-on-the-crime-attack.aspx Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 23/36
  • 26. TIME 2013. Be’ery and Shulman present TIME at BlackHat Europe. Extend on the CRIME Attack: I Attacker generates HTTP requests (XSS, injection,..) I Attacker exploits SOP design flaw and measures RTT differences I determines correct or failed guesses by SOP timing leak https://media.blackhat.com/eu-13/briefings/Beery/bh-eu-13-a-perfect-crime-beery-wp.pdf https://www.youtube.com/watch?v=rTIpFfTp3-w Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 24/36
  • 27. Lucky13 2013. AlFardan and Paterson present a novel attack against CBC for TLS and DTLS based on timing analysis. I Attacker intercepts and modifies a message including padding I Attacker tempers with the padding of the message I MAC computation takes longer during decryption process I Attacker repeats and measures I Attacker performs padding oracle attack described earlier I (Extremely latency sensitive attack) http://www.isg.rhul.ac.uk/tls/Lucky13.html http://www.isg.rhul.ac.uk/tls/TLStiming.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 25/36
  • 28. RC4 Biases 2013. AlFardan, Bernstein, Paterson, Poettering and Schuldt publish a generic attack on the RC4 cipher for TLS and WPA. I Statistical biases in the first 257 bytes of ciphertext I Recovery of the first 200 bytes after 228 to 232 encryption operations of the same plaintext I A broadcast attack: mounted on unique keys I May also be mounted with a single key with repeating target plaintexts I Only feasible for large amounts of data and very time consuming http://www.isg.rhul.ac.uk/tls http://www.isg.rhul.ac.uk/tls/RC4biases.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 26/36
  • 29. NIST curves 2013 & 2014. Daniel J. Bernstein and Tanja Lange voice concern about the NIST Elliptic Cuves that are widely implemented and used in TLS for ECDH and ECDSA I NIST curves defined on recommendations by NSA’s Jerry Solinas I Unclear why these curves and their parameters were chosen I NIST cites efficiency: more efficient and secure curves available I Possible mathematical backdoor through previous analysis and carefully chosen and unexplained parameters I Start SafeCurves project (ongoing) http://www.hyperelliptic.org/tanja/vortraege/20130531.pdf http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf http://safecurves.cr.yp.to https://archive.org/details/ShmooCon2014_SafeCurves Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 27/36
  • 30. BREACH 2013. Gluck, Harris and Prado demonstrate yet another attack based on CRIME at BlackHat USA. Very similar to CRIME but the attack works based on information leaks from HTTP compression instead of TLS compression. http://breachattack.com https://www.youtube.com/watch?v=CoNKarq1IYA Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 28/36
  • 31. Unused Certificates in Truststores 2014. Perl, Fahl, Smith publish a paper entitled “You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores” I Compared 48 mio. HTTP certificates I 140 CA Certificates are unused in all major trust stores I Of 426 trusted root certificates only 66% are even used http://fc14.ifca.ai/papers/fc14_submission_100.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 29/36
  • 32. Triple Handshakes Considered Harmful 2014. Bhargavan, Delignat-Lavaud, Pironti, Langley and Ray present an attack one day before the IETF’89 meeting in London. I Limited to client-certificate authentication with renegotiation I MITM attack on renegotiation with a three-way handshake I Variations of the attack also discussed on their website I Can’t possibly fit this into one slide, homework: understand the attack by reading their excellent description on the website https://secure-resumption.com https://secure-resumption.com/IETF-triple-handshakes.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 30/36
  • 33. Frankencerts 2014. Brubaker, Jana, Ray, Khurshid and Shmatikovy publish a paper entitled “Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations” I Fuzzing of X.509 related code in all major implementations shows serious weaknesses in certificate validation and handling I OpenSSL, NSS, GnuTLS, MatrixSSL, PolarSSL, CyaSSL, cyptlib [...] https://www.cs.utexas.edu/~shmat/shmat_oak14.pdf https://github.com/sumanj/frankencert Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 31/36
  • 34. Heartbleed 2014. Heartbleed is independently discovered by Codenomicon and a Google Security engineer. Faulty implementation in OpenSSL of the TLS Heartbleed extension leaks memory content over the wire. This has been all over the media and discussed in detail all over the internet. People have successfully extracted sensitive information (password files et cetera) from victim memory. I wrote an nmap plugin to scan for Heartbleed: https://github.com/azet/nmap-heartbleed http://heartbleed.com Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 32/36
  • 35. Virtual Host Confusion 2014. At BlackHat Delignat-Lavaud presents an attack based on SSLv3 downgrade and sharing of session caches I Attacker forces downgrade to SSLv3 I For SSLv3: larger deployments share session caches I attacker exploits a server vulnerability where session caches are reused I attacker requests different subdomain with SSLv3 using the same session I vulnerable server will allow connection w/o authentication I www.company.com vs git.company.com https://bh.ht.vc Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 33/36
  • 36. POODLE 2014. POODLE: Padding Oracle On Downgraded Legacy Encryption - OpenSSL/Google I MITM attacker downgrades to SSLv3 (once again) I attacker does block duplication I takes on average 256 requests to decrypt 1 byte (!) I disabling SSLv3 or using the FALLBACK_SCSV TLS extension (draft) mitigates this issue entirely https://www.openssl.org/~bodo/ssl-poodle.pdf Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 34/36
  • 37. Implementation Issues There are tons of other issues with TLS stacks and software implementations that have not been discussed. OpenSSL alone published 24 security advisories in 2014 until today. I Apple’s GOTO fail I GnuTLS GOTO fail I various GnuTLS vulnerabilities I wrong use of OpenSSL API in server and client software ... Clearly; a lot of people current have their eyes on this very topic. Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 35/36
  • 38. Implementation Issues For this crowd: It’s up to you to find them and improve existing implementations, protocols and standards. Hack.lu - 21/10/2014 Bettercrypto - Applied Crypto Hardening for Sysadmins Aaron Zauner 36/36