[Ab]using TLS for defensive wins

SecTor 2016

Presented by: Lee Brotherston
Date: Tuesday October 18, 2016
Time: 14:40 - 15:40
Location: 701A
Track: Tech

TLS, and it’s older forerunner SSL, are used to maintain the confidentiality and integrity of network communications. This is a double edged sword for Information Security departments as this allows private information to remain private, but can also be used to hide malicious activity.

Current defensive measures for dealing with network traffic encrypted using TLS typically takes one of two forms; attempting to detect malicious activities via other means which are outside of the encrypted session, such as endpoint security tools and IP address blacklists. The other approach is to break the TLS trust model by effectively attacking all connections, including trusted connections, via MiTM with a trusted certificate.

This talk discusses the problems with the current state of the art and introduces other techniques, such as TLS Fingerprinting and TLS Handshake Mangling, which can be used to solve the same problems with less of the issues.

Links

Lee Brotherston

Lee has worked within Information Security for over a decade. In that time he has held positions ranging from hands-on practitioner through to management with overall responsibility for Information Security across many verticals. He has spoken on topics ranging from malware analysis to network security and surveillance. 2016 marks his third year speaking at SecTor.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats