Publication Details
SSL/TLS Interception Workshop
SSL, TLS, MitmM
The presentation introduces methods for intercepting TLS/SSL connections. The focus is on man-in-middle attack employing TLS/SSL proxy and other ways how to obtain session's private keys. Speakers will outline necessary theory (including the history of SSL/TLS framework design), well-known attacks (including OpenSSL Hearthbleed, Logjam or BEAST) and industry standard tools (such as Wireshark, NetFox Detective, Fiddler Proxy and SSL-Split). The session will also include a live demonstration of MitM attack on HTTPS connections enhanced with form-logging JavaScript injection. Participants will receive free of charge access to test-bed, which consists of real devices (and their traffic) including the prototype of our hardware probe decrypting SSL/TLS on-the-fly.
@misc{BUT176466,
author="Jan {Pluskal} and Vladimír {Veselý}",
title="SSL/TLS Interception Workshop",
year="2019",
pages="60",
address="Praha",
url="https://www.fit.vut.cz/research/publication/12146/",
note="presentation"
}