Hackers of CypherCon

Hackers of CypherCon

Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer (2x16)


:

This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.

  • :
  • : 52
  • : 2
  • Prime Video